the proceedings contain 22 papers. the special focus in this conference is on System Design, Testing Related theory, Parallel Systems and Vision. the topics include: Conformance testing techniques for timed systems;co...
ISBN:
(纸本)354000145X
the proceedings contain 22 papers. the special focus in this conference is on System Design, Testing Related theory, Parallel Systems and Vision. the topics include: Conformance testing techniques for timed systems;counter-constrained finite state machines;a new model for component protocols with resource-dependencies;equivalence-checking with infinite-state systems;database support for multisource multiresolution scientific data;semantic annotation and indexing of news and sports videos;interactive indexing and retrieval of multimedia content;a model-based approach to semantic-based retrieval of visual information;bipolarity in possibilistic logic and fuzzy rules;data management challenges for grid computing;Hungarian speech synthesis using a phase exact HNM approach;modelling resource transitions in constraint-based scheduling;a specification framework for real- time scheduling;validation and decomposition of partially occluded images;solving conflicts of agent knowledge states in multiagent systems;specification and verification of secure business transaction systems;agent- oriented model of simulated evolution;the reconstruction of some 3d convex polyominoes from orthogonal projections and the complexity of probabilistic versus quantum finite automata.
For a fixed graph H, the H-CONTRACTIBILITY problem asks if a graph is H-contractible, i.e., can be transformed into H via a series of edge contractions. the computational complexity classification of tins problem is s...
详细信息
ISBN:
(纸本)9783642112652
For a fixed graph H, the H-CONTRACTIBILITY problem asks if a graph is H-contractible, i.e., can be transformed into H via a series of edge contractions. the computational complexity classification of tins problem is still open. So far, H has a dominating vertex in all cases known to be polynomially solvable, whereas H does not have such a vertex in all cases known to be NP-complete. Here, we present a class of graphs H with a dominating vertex for which H-CONTRACTIBILITY is NP-complete. We also present a new class of graphs H for which H-CONTRACTIBILITY is polynomially solvable. Furthermore, we study the (H,v)-CONTRACTIBILITY problem, where v is a vertex of H. the input of this problem is a graph G and an integer k. the question is whether G is H-contractible such that the "bag" of G corresponding to v contains at least k vertices. We show that this problem is NP-complete whenever H is connected and v is not a dominating vertex of H.
In this paper, we propose a novel crowd detection method for drone safe landing, based on an extremely light and fast fully convolutional neural network. Such a computer vision application takes advantage of the techn...
详细信息
ISBN:
(纸本)9783030389192;9783030389185
In this paper, we propose a novel crowd detection method for drone safe landing, based on an extremely light and fast fully convolutional neural network. Such a computer vision application takes advantage of the technical tools some commercial drones are equipped with. the proposed architecture is based on a two-loss model in which the main classification task, aimed at distinguishing between crowded and non-crowded scenes, is simultaneously assisted by a regression task, aimed at people counting. In addition, the proposed method provides class activation heatmaps, useful to semantically augment the flight maps. To evaluate the effectiveness of the proposed approach, we used the challenging VisDrone dataset, characterized by a very large variety of locations, environments, lighting conditions, and so on. the model developed by the proposed two-loss deep architecture achieves good values of prediction accuracy and average precision, outperforming models developed by a similar one-loss architecture and a more classic scheme based on MobileNet. Moreover, by lowering the confidence threshold, the network achieves very high recall, without sacrificing too much precision. the method also compares favorably withthe state-of-the-art, providing an effective and efficient tool for several safe drone applications.
the proceedings contain 35 papers. the special focus in this conference is on trends in Algorithmics and Information Technologies in practice. the topics include: A software engineering discipline in need of research;...
ISBN:
(纸本)3540413480
the proceedings contain 35 papers. the special focus in this conference is on trends in Algorithmics and Information Technologies in practice. the topics include: A software engineering discipline in need of research;exhaustive search, combinatorial optimization and enumeration;the incompressibility method;algorithms for rational agents;simplified witness tree arguments;physical design of CMOS chips in six easy steps;analysis patterns;information society technologies in healthcare;towards high speed grammar induction on large text corpora;information access based on associative calculation;exploiting ecological niche and morphology;hierarchies of sensing and control in visually guided agents;recognizing objects by their appearance using eigenimages;applications in image processing;an automatic composition algorithm for functional logic programs;on the approximation ratio of the group-merge algorithm for the shortest common superstring problem;fast evolutionary chains;a temporal layered knowledge architecture for an evolving structured environment;on-line maximum-order induced hereditary subgraph problems;quantum pushdown automata;use of dependency microcontexts in information retrieval;some notes on the information flow in read-once branching programs;on vision-based orientation method of a robot head in a dark cylindrical pipe;autonomous components;parallel object server for fine grained objects;massively parallel pattern recognition with link failures;finitary observations in regular algebras and using consensus methods for solving conflicts of data in distributed systems.
the international conference on currenttrends in the theory and practice of informatics SOFSEM 2000 was held 25 November–2 December 2000 in the c- ference facilities of the Dev?et Skal (Nine Rocks) Hotel, Milovy, Cz...
详细信息
ISBN:
(数字)9783540444114
ISBN:
(纸本)9783540413486
the international conference on currenttrends in the theory and practice of informatics SOFSEM 2000 was held 25 November–2 December 2000 in the c- ference facilities of the Dev?et Skal (Nine Rocks) Hotel, Milovy, Czech-Moravian Highlands, the Czech Republic. It was already the 27th annual meeting in the series of SOFSEM conferences organized in either the Czech or the Slovak Rep- lic. Since its establishment in 1974, SOFSEM has gone through a long dev- opment in parallel withthe entire ?eld of informatics. currently SOFSEM is a wide-scope, multidisciplinary conference, with stress on the interplay between the theory and practice of informatics. the SOFSEM scienti?c program consists mainly of invited talks which determine the topics of the conference. Invited talks are complemented by short refereed talks contributed by SOFSEM parti- pants. the topics of invited talks are chosen so as to cover the span from theory to practice and to bring interesting research areas to the attention of conf- ence participants. For the year 2000, the following three streams were chosen for presentation by the SOFSEM Steering Committee: – trends in Algorithmics – Information Technologies in practice – Computational Perception the above streams were covered through 16 invited talks given by prominent researchers. there were 18 contributed talks also presented, chosen by the int- national Program Committee from among 36 submitted papers. the program also included a panel on lessons learned from the Y2K problem.
Lamport’s Bakery algorithm is among the best known mutual exclusion algorithms. A drawback of Lamport’s algorithm is that it requires unbounded registers for communication among processes. By making a small modifica...
详细信息
A distributed algorithm for the single source shortest path problem for directed graphs with arbitrary edge lengths is proposed. the new algorithm is basedon relaxations anduses reverse search for inspecting edges and...
详细信息
We investigate the security properties of the three deterministic random bit generator (DRBG) mechanisms in NIST SP 800-90A [2]. the standard received considerable negative attention due to the controversy surrounding...
详细信息
ISBN:
(纸本)9783030176563;9783030176556
We investigate the security properties of the three deterministic random bit generator (DRBG) mechanisms in NIST SP 800-90A [2]. the standard received considerable negative attention due to the controversy surrounding the now retracted DualEC-DRBG, which appeared in earlier versions. Perhaps because of the attention paid to the DualEC, the other algorithms in the standard have received surprisingly patchy analysis to date, despite widespread deployment. this paper addresses a number of these gaps in analysis, with a particular focus on HASH-DRBG and HMAC-DRBG. We uncover a mix of positive and less positive results. On the positive side, we prove (with a caveat) the robustness [13] of HASH-DRBG and HMAC-DRBG in the random oracle model (ROM). Regarding the caveat, we show that if an optional input is omitted, then contrary to claims in the standard HMAC-DRBG does not even achieve the (weaker) property of forward security. We then conduct a more informal and practice-oriented exploration of flexibility in the standard. Specifically, we argue that these DRBGs have the property that partial state leakage may lead security to break down in unexpected ways. We highlight implementation choices allowed by the overly flexible standard that exacerbate boththe likelihood, and impact, of such attacks. While our attacks are theoretical, an analysis of two open source implementations of CTR-DRBG shows that these potentially problematic implementation choices are made in the real world.
We introduce quantum finite state transducers (qfst), and study the class of relations which they compute. It turns out that they share many features with probabilistic finite state transducers, especially regarding u...
详细信息
the string matching problem on a node-labeled graph G = (V, E) asks whether a given pattern string P has an occurrence in G, in the form of a path whose concatenation of node labels equals P. this is a basic primitive...
详细信息
ISBN:
(纸本)9783030677305;9783030677312
the string matching problem on a node-labeled graph G = (V, E) asks whether a given pattern string P has an occurrence in G, in the form of a path whose concatenation of node labels equals P. this is a basic primitive in various problems in bioinformatics, graph databases, or networks, but only recently proven to have a O(vertical bar E vertical bar P vertical bar)-time lower bound, under the Orthogonal Vectors Hypothesis (OVH). We consider here its indexed version, in which we can index the graph in order to support time-efficient string queries. We show that, under OVH, no polynomial-time indexing scheme of the graph can support querying P in time O(vertical bar P vertical bar+vertical bar E vertical bar d vertical bar P vertical bar(beta)), with either delta < 1 or beta < 1. As a side-contribution, we introduce the notion of linear independent-components (lic) reduction, allowing for a simple proof of our result. As another illustration that hardness of indexing follows as a corollary of a lic reduction, we also translate the quadratic conditional lower bound of Backurs and Indyk (STOC 2015) for the problem of matching a query string inside a text, under edit distance. We obtain an analogous tight quadratic lower bound for its indexed version, improving the recent result of Cohen-Addad, Feuilloley and Starikovskaya (SODA 2019), but with a slightly different boundary condition.
暂无评论