id int64 1 302k | paper_id stringlengths 2 9 | text_a stringlengths 385 9.83k | text_b stringlengths 385 9.94k |
|---|---|---|---|
190,476 | 2163379 | manysat: a parallel sat solver in this paper, manysat a new portfolio-based parallel sat solver is thoroughly described. the design of manysat benefits from the main weaknesses of modern sat solvers: their sensitivity to parameter tuning and their lack of robustness. manysat uses a portfolio of complementary sequential... | extending sat solvers to cryptographic problems cryptography ensures the confidentiality and authenticity of information but often relies on unproven assumptions. sat solvers are a powerful tool to test the hardness of certain problems and have successfully been used to test hardness assumptions. this paper extends a s... |
68,481 | 14231685 | gesture based 3d man-machine interaction using a single camera this paper describes a new gesture based input interface system that allows users to control both 2d and 3d applications using simple hand gestures. using a single camera attached to the computer, the system tracks the user's hand in three dimensions and co... | visual gesture interfaces for virtual environments virtual environments provide a whole new way of viewing and manipulating 3d data. current technology moves the images out of desktop monitors and into the space immediately surrounding the user. users can literally put their hands on the virtual objects. unfortunately ... |
138,131 | 6519950 | testing noninterference, quickly information-flow control mechanisms are difficult to design and labor intensive to prove correct. to reduce the time wasted on proof attempts doomed to fail due to broken definitions, we advocate modern random testing techniques for finding counterexamples during the design process. we ... | a theory of information-flow labels the security literature offers a multitude of calculi, languages, and systems for information-flow control, each with some set of labels encoding security policies that can be attached to data and computations. the exact form of these labels varies widely, with different systems offe... |
298,568 | 27609538 | exploring students learning behavior with an interactive etextbook in computer science courses we present empirical findings from using an interactive electronic textbook (etextbook) system named opendsa to teach sophomore- and junior-level computer science courses. the web-based etextbook infrastructure allows us to c... | design, development, and learning in e-textbooks: what we learned and where we are going in the last decade, the use of e-textbooks has received attention in research and practice. however, the expanded use of e-textbooks was not easily achieved because of the missing standards in learning content and functionalities, ... |
85,774 | 15319211 | multicast routing and wavelength assignment in multihop optical networks this paper addresses multicast routing in circuit-switched multihop optical networks employing wavelength-division multiplexing. we consider a model in which multicast communication requests are made and released dynamically over time. a multicast... | route optimization of multicast sessions in sparse light-splitting optical networks in this paper, we investigate the multicast routing problem in sparse splitting networks (mr-ssn). the mr-ssn problem is to find a route from the source node of a session to all destinations of the session such that the total number of ... |
203,660 | 56727090 | explicit search result diversification through sub-queries queries submitted to a retrieval system are often ambiguous. in such a situation, a sensible strategy is to diversify the ranking of results to be retrieved, in the hope that users will find at least one of these results to be relevant to their information need... | image clustering based on a shared nearest neighbors approach for tagged collections browsing and finding pictures in large-scale and heterogeneous collections is an important issue, most particularly for online photo sharing applications. since such services are experiencing rapid growth of their databases, the tag-ba... |
218,314 | 63167150 | opcode sequences as representation of executables for data-mining-based unknown malware detection malware can be defined as any type of malicious code that has the potential to harm a computer or network. the volume of malware is growing faster every year and poses a serious global security threat. consequently, malwar... | learning to detect and classify malicious executables in the wild we describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. we gathered 1,971 benign and 1,651 malicious executables and encoded each as a training example using n-grams of byte codes a... |
217,855 | 2048438 | joint 3d-reconstruction and background separation in multiple views using graph cuts this paper deals with simultaneous depth map estimation and background separation in a multi-view setting with several fixed calibrated cameras, two problems which have previously been addressed separately. we demonstrate that their st... | robust graph-cut scene segmentation and reconstruction for free-viewpoint video of complex dynamic scenes current state-of-the-art image-based scene reconstruction techniques are capable of generating high-fidelity 3d models when used under controlled capture conditions. however, they are often inadequate when used in ... |
198,235 | 69161924 | warped register file: a power efficient register file for gpgpus general purpose graphics processing units (gpgpus) have the ability to execute hundreds of concurrent threads. to support massive parallelism gpgpus provide a very large register file, even larger than a cache, to hold the state of each thread. as technol... | energy-efficient time-division multiplexed hybrid-switched noc for heterogeneous multicore systems nocs are an integral part of modern multicore processors, they must continuously support high-throughput low-latency on-chip data communication under a stringent energy budget when system size scales up. heterogeneous mul... |
232,764 | 1702420 | reconciling statechart semantics statecharts are a visual technique for modelling reactive behaviour. over the years, a plethora of statechart semantics have been proposed. the three most widely used are the fixpoint, statemate, and uml semantics. these three semantics differ considerably from each other. in general, t... | big-step semantics with the popularity of model-driven methodologies, and the abundance of modelling languages, a major question for a requirements engineer is: which language is suitable for modelling a system under study? we address this question from a semantic point-of-view for big-step modelling languages (bsmls).... |
297,991 | 201657586 | duty cycle adaptive adjustment based device to device (d2d) communication scheme for wsns device to device (d2d) communication is a key candidate for 5g. its purpose is to enable direct communication between user devices that are close to each other, thereby reducing the load on the base station. wireless sensor networ... | minimizing convergecast time and energy consumption in green internet of things real-time surveillance systems with green wireless sensor networks (wsns) are vital for maintaining high energy efficiency in many situations. this paper considers a scenario utilizing green wsns to monitor the situation of internet of thin... |
221,717 | 18854256 | a very modal model of a modern, major, general type system we present a model of recursive and impredicatively quantified types with mutable references. we interpret in this model all of the type constructors needed for typed intermediate languages and typed assembly languages used for object-oriented and functional la... | a semantic model for graphical user interfaces we give a denotational model for graphical user interface (gui) programming using the cartesian closed category of ultrametric spaces. the ultrametric structure enforces causality restrictions on reactive systems and allows well-founded recursive definitions by a generaliz... |
108,200 | 199542477 | internet of things (iot): a vision, architectural elements, and future directions ubiquitous sensing enabled by wireless sensor network (wsn) technologies cuts across many areas of modern day living. this offers the ability to measure, infer and understand environmental indicators, from delicate ecologies and natural r... | chapter ten free and open source geospatial tools for environmental modelling and management abstract geospatial (geographical) software systems (gis) are used for creating, viewing, managing, analysing and utilising geospatial data. geospatial data can include socioeconomic, environmental, geophysical, and technical d... |
260,760 | 67869150 | two basic algorithms in concept analysis we describe two algorithms for closure systems. the purpose of the first is to produce all closed sets of a given closure operator. the second constructs a minimal family of implications for the ”logic” of a closure system. these algorithms then are applied to problems in concep... | an efficient algorithm for increasing the granularity levels of attributes in formal concept analysis necessary and sufficient conditions for identifying different types of concepts.an efficient and unified method of concept classification.a preprocessing routine to help create new concepts and fix the covering relatio... |
20,448 | 53493233 | automated programmable control and parameterization of compiler optimizations we present a framework which effectively combines programmable control by developers, advanced optimization by compilers, and flexible parameterization of optimizations to achieve portable high performance. we have extended rose, a c/c++/fort... | poet: parameterized optimizations for empirical tuning the excessive complexity of both machine architectures and applications have made it difficult for compilers to statically model and predict application behavior. this observation motivates the recent interest in performance tuning using empirical techniques. we pr... |
217,669 | 53452597 | analysis of a nonpreemptive priority queue with spp arrivals of high class abstract this paper considers a nonpreemptive priority queueing system with two priority classes of customers, where high priority customers arrive to the system in accordance with a switched poisson process ( spp ) and low priority customers in... | discrete-time queueing models with priorities this phd-dissertation contains analyses of several discrete-time two-class priority queueing systems. we analyze non-preemptive, preemptive resume as well as preemptive repeat priority queues. the analyses are heavily based on probability generating functions that allow us ... |
75,313 | 1994568 | using the wisdom of the crowds for keyword generation in the sponsored search model, search engines are paid by businesses that are interested in displaying ads for their site alongside the search results. businesses bid for keywords, and their ad is displayed when the keyword is queried to the search engine. an import... | query suggestion using hitting time generating alternative queries, also known as query suggestion, has long been proved useful to help a user explore and express his information need. in many scenarios, such suggestions can be generated from a large scale graph of queries and other accessory information, such as the c... |
270,367 | 3043202 | appearance-based person reidentification in camera networks: problem overview and current approaches recent advances in visual tracking methods allow following a given object or individual in presence of significant clutter or partial occlusions in a single or a set of overlapping camera views. the question of when per... | people reidentification in surveillance and forensics: a survey the field of surveillance and forensics research is currently shifting focus and is now showing an ever increasing interest in the task of people reidentification. this is the task of assigning the same identifier to all instances of a particular individua... |
97,885 | 33616303 | transparent implementation of conservative algorithms in parallel simulation languages parallel discrete event simulation offers significant speedup over the traditional sequential event list algorithm. a number of conservative and optimistic algorithms have been proposed and studied for parallel simulation. we examine... | distributed simulation: a case study in design and verification of distributed programs the problem of system simulation is typically solved in a sequential manner due to the wide and intensive sharing of variables by all parts of the system. we propose a distributed solution where processes communicate only through me... |
300,218 | 3831205 | incorporating partitioning and parallel plans into the scope optimizer massive data analysis on large clusters presents new opportunities and challenges for query optimization. data partitioning is crucial to performance in this environment. however, data repartitioning is a very expensive operation so minimizing the n... | hyracks: a flexible and extensible foundation for data-intensive computing hyracks is a new partitioned-parallel software platform designed to run data-intensive computations on large shared-nothing clusters of computers. hyracks allows users to express a computation as a dag of data operators and connectors. operators... |
290,789 | 15188571 | tree based test case generation and cost calculation strategy for uniform parametric pairwise testing problem statement: although it is very important to test any system extensively it is usually too expensive to do so owing to the cost and the resources that are involved in it. software testing is a very important pha... | a parallel tree based strategy for test data generation and cost calculation for pairwise combinatorial interaction testing software testing is a very important phase of the software development cycle which ensures that the system developed is reliable and acceptable. optimizing the test suite size of software eliminat... |
254,352 | 579130 | beyond isolation: research opportunities in declarative data-driven coordination there are many database applications that require users to coordinate and communicate. friends want to coordinate travel plans, students want to jointly enroll in the same set of courses, and busy professionals want to coordinate their sch... | hilda: a high-level language for data-drivenweb applications we propose hilda, a high-level language for developing data-driven web applications. the primary benefits of hilda over existing development platforms are: (a) it uses a unified data model for all layers of the application, (b) it is declarative, (c) it model... |
191,541 | 61325486 | cooperative mobile robotics: antecedents and directions there has been increased research interest in systems composed of multiple autonomous mobile robots exhibiting collective behavior. groups of mobile robots are constructed, with an aim to studying such issues as group architecture, resource conflict, origin of coo... | communication in reactive multiagent robotic systems multiple cooperating robots are able to complete many tasks more quickly and reliably than one robot alone. communication between the robots can multiply their capabilities and effectiveness, but to what extent? in this research, the importance of communication in ro... |
100,832 | 748556 | style adaptive bayesian tracking using explicit manifold learning characteristics of the 2d contour shape deformation in human motion contain rich information and can be useful for human identification, gender classification, 3d pose reconstruction and so on. in this paper we introduce a new approach for contour tracki... | gait tracking and recognition using person-dependent dynamic shape model the characteristics of the 2d shape deformation in human motion contain rich information for human identification and pose estimation. in this paper, we introduce a framework for simultaneous gait tracking and recognition using person-dependent gl... |
52,009 | 14917262 | integrating organizational requirements and object oriented modeling in recent years we have observed a growing influence of the object-oriented paradigm. unfortunately, the current dominant object oriented modeling technique, i.e. the unified modeling language, uml, is ill equipped for modeling early requirements whic... | an mda approach for goal-oriented requirement analysis in web engineering web designers usually ignore how to model real user expectations and goals, mainly due to the large and heterogeneous audience of the web. this fact leads to websites which are difficult to comprehend by visitors and complex to maintain by design... |
104,681 | 2081670 | the workload onparallel supercomputers: modeling the characteristics of rigid jobs the analysis of workloads is important for understanding how systems are used. in addition, workload models are needed as input for the evaluation of new system designs, and for the comparison of system designs. this is especially import... | self-configuring network traffic generation the ability to generate repeatable, realistic network traffic is critical in both simulation and testbed environments. traffic generation capabilities to date have been limited to either simple sequenced packet streams typically aimed at throughput testing, or to application-... |
284,207 | 12294869 | network-aware query processing for stream-based applications this paper investigates the benefits of network awareness when processing queries in widely-distributed environments such as the internet. we present algorithms that leverage knowledge of network characteristics (e.g., topology, bandwidth, etc.) when deciding... | challenges and experience in prototyping a multi-modal stream analytic and monitoring application on system s in this paper, we describe the challenges of prototyping a reference application on system s, a distributed stream processing middleware under development at ibm research. with a large number of stream pes (pro... |
297,276 | 208269499 | topic labeled text classification: a weakly supervised approach supervised text classifiers require extensive human expertise and labeling efforts. in this paper, we propose a weakly supervised text classification algorithm based on the labeling of latent dirichlet allocation (lda) topics. our algorithm is based on the... | dataless text classification: a topic modeling approach with document manifold recently, dataless text classification has attracted increasing attention. it trains a classifier using seed words of categories, rather than labeled documents that are expensive to obtain. however, a small set of seed words may provide very... |
11,826 | 70030277 | probabilistic aggregation strategies in swarm robotic systems in this study, a systematic analysis of probabilistic aggregation strategies in swarm robotic systems is presented. a generic aggregation behavior is proposed as a combination of four basic behaviors: obstacle avoidance, approach, repel, and wait. the latter... | self-organized aggregation triggers collective decision making in a group of cockroach-like robots self-amplification processes are at the origin of several collective decision phenomena in insect societies. understanding these processes requires linking individual behavioral rules of insects to a choice dynamics at th... |
60,233 | 13882846 | scalable and efficient provable data possession storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively investigated in the past. however, provable data possession (pdp) is a topic that has only recently appeared in the research literature. the ma... | a multiple-replica remote data possession checking protocol with public verifiability many cloud storage providers declare that they store multiple replicas of clients’ data in order to prevent data loss. however, currently there is no guarantee that they actually spend storage for multiple replicas. recently a multipl... |
195,696 | 8942945 | relaxing join and selection queries database users can be frustrated by having an empty answer to a query. in this paper, we propose a framework to systematically relax queries involving joins and selections. when considering relaxing a query condition, intuitively one seeks the 'minimal' amount of relaxation that yiel... | vgram: improving performance of approximate queries on string collections using variable-length grams many applications need to solve the following problem of approximate string matching: from a collection of strings, how to find those similar to a given string, or the strings in another (possibly the same) collection ... |
117,817 | 6301125 | type-based analysis of deadlock for a concurrent calculus with interrupts the goal of our research project is to establish a type-based method for verification of certain critical properties (such as deadlock-and race-freedom) of operating system kernels. as operating system kernels make heavy use of threads and interr... | type inference for deadlock detection in a multithreaded polymorphic typed assembly language we previously developed a polymorphic type system and a type checker for a multithreaded lock-based polymorphic typed assembly language (mil) that ensures that well-typed programs do not encounter race conditions. this paper ex... |
128,872 | 3239246 | formal concept analysis approach to cognitive functionalities of bidirectional associative memory abstract pattern association is one among the ways through which human brain stores and recalls information. from the literature, it is evident that cognitive abilities of human brain such as learning, memorizing, recallin... | parallel computing techniques for concept-cognitive learning based on granular computing concept-cognitive learning, as an interdisciplinary study of concept lattice and cognitive learning, has become a hot research direction among the communities of rough set, formal concept analysis and granular computing in recent y... |
291,745 | 11363663 | efficient learning of linear predictors using dimensionality reduction using linear predictors for template tracking enables fast and reliable real-time processing. however, not being able to learn new templates online limits their use in applications where the scene is not known a priori and multiple templates have to... | online learning of linear predictors for real-time tracking although fast and reliable, real-time template tracking using linear predictors requires a long training time. the lack of the ability to learn new templates online prevents their use in applications that require fast learning. this especially holds for applic... |
150,812 | 206416500 | shape decomposition and skeleton extraction of character patterns this paper proposes an approach to extract skeletons from the character patterns. it first decomposes the pattern into a set of near-convex parts and then extracts skeletons from the parts. in shape decomposition stage, the convex hull information is use... | active balloon model based on 3d skeleton extraction by competitive learning we focus on the polygonal representation of a 3d object model which is composed of a lot of points on the object surface. in the 3d animation, it is sometimes necessary to use multiresolution representation of a model to cope with various situ... |
168,701 | 27068629 | foundational extensible corecursion: a proof assistant perspective this paper presents a formalized framework for defining corecursive functions safely in a total setting, based on corecursion up-to and relational parametricity. the end product is a general corecursor that allows corecursive (and even recursive) calls ... | deriving comparators and show functions in isabelle/hol we present an isabelle/hol development that allows for the automatic generation of certain operations for user-defined datatypes. since the operations are defined within the logic, they are applicable for code generation. triggered by the demand to provide readabl... |
53,263 | 52833786 | solving factored mdps via non-homogeneous partitioning this paper describes an algorithm for solving large state-space mdps (represented as factored mdps) using search by successive refinement in the space of non-homogeneous partitions. homogeneity is defined in terms of bisimulation and reward equivalence within block... | between mdps and semi-mdps: a framework for temporal abstraction in reinforcement learning learning, planning, and representing knowledge at multiple levels of temporal ab- straction are key, longstanding challenges for ai. in this paper we consider how these challenges can be addressed within the mathematical framewor... |
239,768 | 3511794 | fast serializable multi-version concurrency control for main-memory database systems multi-version concurrency control (mvcc) is a widely employed concurrency control mechanism, as it allows for execution modes where readers never block writers. however, most systems implement only snapshot isolation (si) instead of fu... | high-performance concurrency control mechanisms for main-memory databases a database system optimized for in-memory storage can support much higher transaction rates than current systems. however, standard concurrency control methods used today do not scale to the high transaction rates achievable by such systems. in t... |
267,382 | 6257568 | sensing, tracking, and reasoning with relations suppose we have a set of sensor nodes spread over a geographical area. assume that these nodes are able to perform processing as well as sensing and are additionally capable of communicating with each other by means of a wireless network. though each node is an independen... | fault-tolerant compression algorithms for delay-sensitive sensor networks with unreliable links we compare the performance of standard data compression techniques in the presence of communication failures. their performance is inferior to sending data without compression when the packet loss rate of a link is above 10%... |
133,033 | 1946871 | decentralized event correlation for intrusion detection evidence of attacks against a network and its resources is often scattered over several hosts. intrusion detection systems (ids) which attempt to detect such attacks therefore have to collect and correlate information from different sources. we propose a completel... | information fusion for wireless sensor networks: methods, models, and classifications wireless sensor networks produce a large amount of data that needs to be processed, delivered, and assessed according to the application objectives. the way these data are manipulated by the sensor nodes is a fundamental issue. inform... |
33,787 | 1803973 | acceleration techniques for gpu-based volume rendering nowadays, direct volume rendering via 3d textures has positioned itself as an efficient tool for the display and visual analysis of volumetric scalar fields. it is commonly accepted, that for reasonably sized data sets appropriate quality at interactive rates can b... | a simple and flexible volume rendering framework for graphics-hardware-based raycasting in this work we present a flexible framework for gpu-based volume rendering. the framework is based on a single pass volume raycasting approach and is easily extensible in terms of new shader functionality. we demonstrate the flexib... |
204,161 | 209376317 | cascade object detection with deformable part models we describe a general method for building cascade classifiers from part-based deformable models such as pictorial structures. we focus primarily on the case of star-structured models and show how a simple algorithm based on partial hypothesis pruning can speed up obj... | a discriminatively trained, multiscale, deformable part model this paper describes a discriminatively trained, multiscale, deformable part model for object detection. our system achieves a two-fold improvement in average precision over the best performance in the 2006 pascal person detection challenge. it also outperfo... |
269,500 | 67638 | scalable data partitioning techniques for parallel sliding window processing over data streams this paper proposes new techniques for e ciently parallelizing sliding window processing over data streams on a shared-nothing cluster of commodity hardware. data streams are first partitioned on the fly via a continuous spli... | streamcloud: an elastic and scalable data streaming system many applications in several domains such as telecommunications, network security, large-scale sensor networks, require online processing of continuous data flows. they produce very high loads that requires aggregating the processing capacity of many nodes. cur... |
27,940 | 1723789 | an expressive model for the web infrastructure: definition and application to the browser id sso system the web constitutes a complex infrastructure and, as demonstrated by numerous attacks, rigorous analysis of standards and web applications is indispensable. inspired by successful prior work, in particular the work b... | analyzing the browserid sso system with primary identity providers using an expressive model of the web browserid is a complex, real-world single sign-on (sso) system for web applications recently developed by mozilla. it employs new html5 features (such as web messaging and web storage) and cryptographic assertions to... |
298,758 | 43371968 | ffsc: an energy efficiency communications approach for delay minimizing in internet of things it is desirable for alarm packets to be forwarded to the sink as quickly as possible in wireless sensor networks. in this paper, we initially analyze the theory of the relationships between network configurations and network l... | an efficient scheduling model for broadcasting in wireless sensor networks energy efficiency is especially important to the broadcasting operation in wireless sensor networks. it helps to reduce the energy consumption by minimizing the number of relay nodes during the broadcast process in case that the transmission ran... |
120,388 | 15448110 | modeling the data warehouse refreshment process as a workflow application this article is a position paper on the nature of the data warehouse refreshment which is often defined as a view maintenance problem or as a loading process. we will show that the refreshment process is more complex than the view maintenance pro... | information integration: conceptual modeling and reasoning support information integration is one of the core problems in cooperative information systems. the authors argue that two critical factors for the design and maintenance of applications requiring information integration are conceptual modeling of the domain, a... |
222,945 | 56211274 | adaptive efficient downlink packet scheduling algorithm in lte-advanced system for a better exploitation of radio resources in the fourth generation networks (4g) long term evolution-advanced (lte-a) and for a better guarantee of service quality requested for users, radio resources management and specifically schedulin... | delay-prioritized scheduling (dps) for real time traffic in 3gpp lte system given that the co-existence of multimedia applications will be a norm in the future wireless systems, their quality of service (qos) requirements need to be guaranteed. this has imposed new challenges in the design of packet scheduling algorith... |
288,566 | 67451900 | reusability metrics for software components summary form only given. assessing the reusability, adaptability, compose-ability and flexibility of software components is more and more of a necessity due to the growing popularity of component based software development (cbsd). even if there are some metrics defined for th... | complexity metrics for component-oriented software systems component-based software development (cbsd) has become one of the preferred streams for developing large and complex systems by integrating prefabricated software components that not only facilitates the process of software development but is also changing the ... |
191,414 | 12986494 | video rewrite: driving visual speech with audio video rewrite uses existing footage to create automatically new video of a person mouthing words that she did not speak in the original footage. this technique is useful in movie dubbing, for example, where the movie sequence can be modified to sync the actors’ lip motion... | automatic viseme clustering for audiovisual speech synthesis. a common approach in visual speech synthesis is the use of visemes as atomic units of speech. in this paper, phonemebased and viseme-based audiovisual speech synthesis techniques are compared in order to explore the balancing between data availability and an... |
174,486 | 13841585 | adjacent orientation vector based fingerprint minutiae matching system minutia matching is the most popular approach to fingerprint recognition. we analyzed a novel fingerprint feature named adjacent orientation vector, or aov, for fingerprint matching. in the first stage, aov is used to find possible minutiae pairs. t... | adjacent orientation vector based fingerprint minutiae matching system minutia matching is the most popular approach to fingerprint recognition. we analyzed a novel fingerprint feature named adjacent orientation vector, or aov, for fingerprint matching. in the first stage, aov is used to find possible minutiae pairs. t... |
36,292 | 53280899 | evaluation of svm, mlp and gmm classifiers for layout analysis of historical documents this paper presents a comparison between three classifiers based on support vector machines, multi-layer perceptrons and gaussian mixture models respectively to detect physical structure of historical documents. each classifier segme... | dhsegment: a generic deep-learning approach for document segmentation in recent years there have been multiple successful attempts tackling document processing problems separately by designing task specific hand-tuned strategies. we argue that the diversity of historical document processing tasks prohibits to solve the... |
234,546 | 126819 | defocus deblurring and superresolution for time-of-flight depth cameras continuous-wave time-of-flight (tof) cameras show great promise as low-cost depth image sensors in mobile applications. however, they also suffer from several challenges, including limited illumination intensity, which mandates the use of large num... | robust saliency detection via regularized random walks ranking in the field of saliency detection, many graph-based algorithms heavily depend on the accuracy of the pre-processed superpixel segmentation, which leads to significant sacrifice of detail information from the input image. in this paper, we propose a novel b... |
278,244 | 9559859 | a scalable location service for geographic ad hoc routing gls is a new distributed location service which tracks mobile node locations. gls combined with geographic forwarding allows the construction of ad hoc mobile networks that scale to a larger number of nodes than possible with previous work. gls is decentralized ... | location-aided routing (lar) in mobile ad hoc networks a mobile ad hoc network consists of wireless hosts that may move often. movement of hosts results in a change in routes, requiring some mechanism for determining new routes. several routing protocols have already been proposed for ad hoc networks. this report sugge... |
217,499 | 43334397 | rule-based modeling of biochemical networks a method for the automatic generation of mathematical/computational models that account comprehensively and precisely for the full spectrum of chemical species implied by user-specified activities, potential modifications and interactions of the molecular components of biomol... | efficient, correct simulation of biological processes in the stochastic pi-calculus this paper presents a simulation algorithm for the stochastic π-calculus, designed for the efficient simulation of biological systems with large numbers of molecules. the cost of a simulation depends on the number of species, rather tha... |
166,699 | 201892152 | optimal home energy management under dynamic electrical and thermal constraints the optimization of energy consumption, with consequent costs reduction, is one of the main challenges in present and future smart grids. of course, this has to occur keeping the living comfort for the end-user unchanged. in this work, an a... | hybrid soft computing algorithmic framework for smart home energy management energy management in smart home environments is undoubtedly one of the pressing issues in the smart grid research field. the aim typically consists in developing a suitable engineering solution able to maximally exploit the availability of ren... |
294,283 | 21703984 | constructing a cds-based network backbone for data collection in wireless sensor networks data collection is one of the most important operations in wireless sensor networks. currently, many researches focus on using a connected dominating set to construct a virtual backbone for data collection in wsns. most researcher... | a distributed reliable and energy-efficient topology control algorithm in wireless sensor network topology control is an efficiency method that can enhance the energy efficiency in a wireless sensor network. there are several research discuss the topology control problem only focus on topology construction or topology ... |
30,498 | 52021524 | multi-task learning of social psychology assessments and nonverbal features for automatic leadership identification in social psychology, the leadership investigation is performed using questionnaires which are either i) self-administered or ii) applied to group participants to evaluate other members or iii) filled by ... | multi-domain and multi-task prediction of extraversion and leadership from meeting videos automatic prediction of personalities from meeting videos is a classical machine learning problem. psychologists define personality traits as uncorrelated long-term characteristics of human beings. however, human annotations of pe... |
128,059 | 1610133 | dense planar slam using higher-level entities during mapping has the potential to improve camera localisation performance and give substantial perception capabilities to real-time 3d slam systems. we present an efficient new real-time approach which densely maps an environment using bounded planes and surfels extracted... | continuous humanoid locomotion over uneven terrain using stereo fusion for humanoid robots to fulfill their mobility potential they must demonstrate reliable and efficient locomotion over rugged and irregular terrain. in this paper we present the perception and planning algorithms which have allowed a humanoid robot to... |
300,028 | 42055141 | on modeling of coevolution of strategies and structure in autonomous overlay networks currently, on one hand, there exist much work about network formation and/or growth models, and on the other hand, cooperative strategy evolutions are extensively investigated in biological, economic, and social systems. generally, ov... | adaptive routing with stale information we investigate adaptive routing policies for large networks in which agents reroute traffic based on old information. it is a well known and practically relevant problem that old information can lead to undesirable oscillation effects resulting in poor performance. we investigate... |
134,983 | 16409182 | query by image and video content: the qbic system research on ways to extend and improve query methods for image databases is widespread. we have developed the qbic (query by image content) system to explore content-based retrieval methods. qbic allows queries on large image and video databases based on example images,... | cires: a system for content-based retrieval in digital image libraries this paper presents cires, a new online system for a content-based retrieval in digital image libraries. content-based image retrieval systems have traditionally used color and texture analyses. these analyses have not always achieved adequate level... |
46,454 | 35652025 | a critical analysis of incremental iterative data flow analysis algorithms a model of data flow analysis and fixed point iteration solution procedures is presented. the faulty incremental iterative algorithm is introduced. examples of the imprecision of restarting iteration from the intraprocedural and interprocedural ... | an efficient hybrid algorithm for incremental data flow analysis our exhaustive and incremental hybrid data flow analysis algorithms, based on iteration and elimination techniques, are designed for incremental update of a wide variety of monotone data flow problems in response to source program changes. unlike previous... |
9,940 | 4966141 | finding a path subject to many additive qos constraints a fundamental problem in quality-of-service (qos) routing is to find a path between a source-destination node pair that satisfies two or more end-to-end qos constraints. we model this problem using a graph with <i>n</i> vertices and <i>m</i> edges with <i>k</i> ad... | multiconstrained qos routing: greedy is good a fundamental problem in quality-of-service (qos) routing is to find a path connecting a source node to a destination node that satisfies k ges 2 additive qos constraints. this multi-constrained path problem (mcp) is known to be np-complete. in a recent paper, xue et at. sho... |
241,444 | 16799125 | auction-based resource allocation for cooperative communications distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. this paper proposes two auction mechanisms, the snr auction and the power auction, that determi... | theoretical analysis of selective relaying, cooperative multi-hop networks with fairness constraints we consider the problem of selective relaying in multi-hop networks. at each slot, a relay and a node along the optimal non-cooperative path are opportunistically selected to transmit to the next-hop node in a cooperati... |
12,591 | 15067371 | utility-function-driven resource allocation in autonomic systems we study autonomic resource allocation among multiple applications based on optimizing the sum of utility for each application. we compare two methodologies for estimating the utility of resources: a queuing-theoretic performance model and model-free rein... | resource allocation for autonomic data centers using analytic performance models large data centers host several application environments (aes) that are subject to workloads whose intensity varies widely and unpredictably. therefore, the servers of the data center may need to be dynamically redeployed among the various... |
15,795 | 8676636 | a graphical query language supporting recursion we define a language g for querying data represented as a labeled graph g . by considering g as a relation, this graphical query language can be viewed as a relational query language, and its expressive power can be compared to that of other relational query languages. we... | graphdb: modeling and querying graphs in databases a fuse striker affords a visual or other indication of an operated condition of an associated fuse and is mounted within the fuse and comprises a housing structure coaxially arranged within the fuse with an end of the housing in contact with an end of the fuse, closure... |
35,905 | 16463927 | explicitly representing expected cost: an alternative to roc representation abstract this paper proposes an alternative to roc representation, in which the expected cost of a classi er is represented explicitly. this expected cost representation maintains many of the advantages of roc representation, but is easier to u... | what roc curves can’t do (and cost curves can this paper shows that roc curves, as a method of visualizing classifier performance, are inadequate for the needs of artificial intelligence researchers in several significant respects, and demonstrates that a different way of visualizing performance – the cost curves intro... |
40,564 | 24752998 | sensecam image localisation using hierarchical surf trees the sensecam is a wearable camera that automatically takes photos of the wearer's activities, generating thousands of images per day. automatically organising these images for efficient search and retrieval is a challenging task, but can be simplified by providi... | sift, surf and seasons: long-term outdoor localization using local features local feature matching has become a commonly used method to compare images. for mobile robots, a reliable method for comparing images can constitute a key component for localization and loop closing tasks. in this paper, we address the issues o... |
291 | 2204231 | competitive co-evolution of predator and prey sensory-motor systems a recent trend in evolutionary robotics research is to maximize self-organization in the design of robotic systems in order to reduce the human designer bias. this article presents simulation experiments that extend nolfi and floreano's work on competi... | co-evolving predator and prey robots in this article i briefly discuss the role that artificial (robotic) models can play in the study of competing co-evolutionary dynamics, the main results obtained in the research works addressing the evolution of predator and prey robots, and the implications of these studies for ro... |
282,256 | 208884101 | bilateral space video segmentation in this work, we propose a novel approach to video segmentation that operates in bilateral space. we design a new energy on the vertices of a regularly sampled spatiotemporal bilateral grid, which can be solved efficiently using a standard graph cut label assignment. using a bilateral... | kernel-induced label propagation by mapping for semi-supervised classification kernel methods have been successfully applied to the areas of pattern recognition and data mining. in this paper, we mainly discuss the issue of propagating labels in kernel space. a kernel-induced label propagation (kernel-lp) framework by ... |
156,938 | 33624798 | image segmentation evaluation: a survey of unsupervised methods image segmentation is an important processing step in many image, video and computer vision applications. extensive research has been done in creating many different approaches and algorithms for image segmentation, but it is still difficult to assess whet... | survey over image thresholding techniques and quantitative performance evaluation we conduct an exhaustive survey of image thresholding methods, categorize them, express their formulas under a uniform notation, and finally carry their performance comparison. the thresholding methods are categorized according to the inf... |
165,636 | 202896194 | neural speech recognizer: acoustic-to-word lstm model for large vocabulary speech recognition we present results that show it is possible to build a competitive, greatly simplified, large vocabulary continuous speech recognition system with whole words as acoustic units. we model the output vocabulary of about 100,000 ... | deep speech 2: end-to-end speech recognition in english and mandarin we show that an end-to-end deep learning approach can be used to recognize either english or mandarin chinese speech-two vastly different languages. because it replaces entire pipelines of hand-engineered components with neural networks, end-to-end le... |
73,616 | 5511267 | determinants of application service provider (asp) adoption as an innovation the trend toward external procurement of software and services has led to the emergence of application service providers (asps). while prior research has investigated the use of asps as a form of outsourcing, this study considers asp from mult... | a meta-analysis of research on information technology implementation in small business the small business sector is one of the fastest growing sectors of the economy. the firms in this sector are becoming increasingly dependent on information systems (is) for their operations. traditional research in is has primarily f... |
240,556 | 36952284 | corpus-guided sentence generation of natural images we propose a sentence generation strategy that describes images by predicting the most likely nouns, verbs, scenes and prepositions that make up the core sentence structure. the input are initial noisy estimates of the objects and scenes detected in the image using st... | frame- and segment-level features and candidate pool evaluation for video caption generation we present our submission to the microsoft video to language challenge of generating short captions describing videos in the challenge dataset. our model is based on the encoder--decoder pipeline, popular in image and video cap... |
99,983 | 140236187 | the moment: a mobile tool for people with depression or bipolar disorder the moment is a mobile application for people with depression or bipolar disorder to monitor their emotional ups and downs, reveal their emotional patterns, and eventually find a peaceful way to live with their emotions, rather than fighting with ... | sleepstellar: a safety kit and digital storyteller for sleepwalkers sleepwalking affects 2-4% of adults and can be a potentially dangerous condition leading to severe safety incidents. we interviewed sleepwalkers and sleep disorder experts; and investigated sleepwalking forums to understand their needs and characterist... |
96,676 | 3203575 | a semantic overlay network for p2p schema-based data integration today data sources are pervasive and their number is growing tremendously. current tools are not prepared to exploit this unprecedented amount of information and to cope with this highly heterogeneous, autonomous and dynamic environment. in this paper, we... | icluster: a self-organizing overlay network for p2p information retrieval we present icluster, a self-organizing peer-to-peer overlay network for supporting full-fledged information retrieval in a dynamic environment. icluster works by organizing peers sharing common interests into clusters and by exploiting clustering... |
58,741 | 209444394 | borrowing treasures from the wealthy: deep transfer learning through selective joint fine-tuning deep neural networks require a large amount of labeled training data during supervised learning. however, collecting and labeling so much data might be infeasible in many cases. in this paper, we introduce a deep transfer l... | domain adaptive transfer learning with specialist models transfer learning is a widely used method to build high performing computer vision models. in this paper, we study the efficacy of transfer learning by examining how the choice of data impacts performance. we find that more pre-training data does not always help,... |
244,293 | 209516424 | fake face detection methods: can they be generalized? with advancements in technology, it is now possible to create representations of human faces in a seamless manner for fake media, leveraging the large-scale availability of videos. these fake faces can be used to conduct personation attacks on the targeted subjects.... | forensictransfer: weakly-supervised domain adaptation for forgery detection distinguishing manipulated from real images is becoming increasingly difficult as new sophisticated image forgery approaches come out by the day. naive classification approaches based on convolutional neural networks (cnns) show excellent perfo... |
238,157 | 203697300 | a centralized scheduling algorithm for ieee 802.15.4e tsch based industrial low power wireless networks time-slotted channel hopping (tsch) is a part of an emerging ieee 802.15.4e standard to enable deterministic low-power mesh networking. it promises to pave the way to the future internet of (important) things by offe... | 6tisch centralized scheduling: when sdn meet iot the deterministic networking paradigm, which is prevalent in operational technology (ot), is now getting traction at the ietf and the ieee, to enable the convergence of ot with information technology (it), and the industrial internet vision, whereby the automation world ... |
124,098 | 4861808 | scheduling data collection with dynamic traffic patterns in wireless sensor networks the network traffic pattern of continuous sensor data collection often changes constantly over time due to the exploitation of temporal and spatial data correlations as well as the nature of condition-based monitoring applications. thi... | a power-efficient distributed tdma scheduling algorithm with distance-measurement for wireless sensor networks this paper describes a power-efficient distributed tdma slot scheduling algorithm which the slot allocation priority is controlled by distance measurement information in details. in our former proposed scheme,... |
42,531 | 392192 | manifold alignment without correspondence manifold alignment has been found to be useful in many areas of machine learning and data mining. in this paper we introduce a novel manifold alignment approach, which differs from "semi-supervised alignment" and "procrustes alignment" in that it does not require predetermining... | semisupervised alignment of manifolds in this paper, we study a family of semisupervised learning algorithms for “aligning” different data sets that are characterized by the same underlying manifold. the optimizations of these algorithms are based on graphs that provide a discretized approximation to the manifold. part... |
204,821 | 3270730 | locadio: inferring motion and location from wi-fi signal strengths context is a critical ingredient of ubiquitous computing. while it is possible to use specialized sensors and beacons to measure certain aspects of a user's context, we are interested in what we can infer from using the existing 802.11 wireless network ... | a task-efficient sink node based on embedded multi-core soc for internet of things abstract with the increase of collected information, the computing performance of single-core sink node for internet of things (iots) cannot satisfy with the demand of large data processing any more. therefore, the sink node which based ... |
215,710 | 3757715 | reactive search for traffic grooming in wdm networks in this paper the reactive local search (rls) heuristic is proposed for the problem of minimizing the number of expensive add-drop multiplexers in a sonet or sdh optical network ring, while respecting the constraints given by the overall number of fibers and the numb... | algorithm for traffic grooming in optical networks to minimize the number of transceivers we study the problem of traffic grooming to reduce the number of transceivers in optical networks. we show that this problem is equivalent to a certain traffic maximization problem. we give an intuitive interpretation of this equi... |
138,207 | 211519562 | a concurrent, generational garbage collector for a multithreaded implementation of ml this paper presents the design and implementation of a “quasi real-time” garbage collector for concurrent caml light, an implementation of ml with threads. this two-generation system combines a fast, asynchronous copying collector on ... | hierarchical memory management for parallel programs an important feature of functional programs is that they are parallel by default. implementing an efficient parallel functional language, however, is a major challenge, in part because the high rate of allocation and freeing associated with functional programs requir... |
42,430 | 67867554 | an integer linear programming approach to the single and bi-objective next release problem contextthe next release problem involves determining the set of requirements to implement in the next release of a software project. when the problem was first formulated in 2001, integer linear programming, an exact method, was ... | software release planning: an evolutionary and iterative approach abstract to achieve higher flexibility and to better satisfy actual customer requirements, there is an increasing tendency to develop and deliver software in an incremental fashion. in adopting this process, requirements are delivered in releases and so ... |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 4