In a negative survey, a category which does not agree with the fact of each participant is collected. Hence, data collectors cannot acquire the realistic data of participants, and this can efficiently protect particip...
详细信息
ISBN:
(纸本)9781849199094
In a negative survey, a category which does not agree with the fact of each participant is collected. Hence, data collectors cannot acquire the realistic data of participants, and this can efficiently protect participants' private information and sensitive data. However, existing approaches used to estimate the distribution of positive surveys from negative surveys are not practical and time-consuming. This paper proposed a method in order to acquire practical estimation results with a lower computing cost, namely fastNStoPS. Usually, privacy and utility are used to measure the performances of negative surveys, and they are two conflicting metrics. Users have different demands on privacy (or utility) under different circumstances. The optimal negative surveys are a Pareto font of these two objectives. To demonstrate its practicability, the proposed fastNStoPS method is embedded into a Differential Evolution (DE), which is used to find the optimal negative surveys. The experiment results show that the DE has a much better performance on find the optimal negative surveys, and the computing cost is very low.
Sea-land segmentation is a key step for target detection. Due to the complex texture and uneven gray value of the land in optical remote sensing image, traditional sea-land segmentation algorithms often recognize land...
详细信息
Edge is a basic feature in the field of computing vision. So to find edge saliency map is an indispensable operation for many applications on image processing. In this paper we present a fast algorithm to find edge sa...
详细信息
An efficient image annotation and retrieval system is highly desired for the increase of amounts of image information. Clustering algorithms make it possible to represent images with finite symbols. Based on this, man...
详细信息
SIFT judge the true or false targets according to the density of matching feature points. But for different images, the numbers of matching feature points are different, the density is different. So SIFT can't jud...
详细信息
Time vector series abound in many fields, which are different from time series. Based on mapping and implicit function interpolation, the method of implicit interpolation over time vector series is developed and studi...
详细信息
In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to ef...
详细信息
In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to effectively discover backdoor behaviors, such as stealing secret information and injecting evil data into system, with less false negatives. With concolic execution on predetermined path, the backdoor trigger condition can be extracted and analyzed to achieve high accuracy. BASEC has been implemented and experimented on several software backdoor samples widespread on the Internet, and over 90% of them can be detected. Compared with behavior-based and system-call-based detection methods, BASEC relies less on the historical sample collections, and is more effective in detecting software backdoors, especially those injected into software by modifying and recompiling source codes.
In this paper a method for precisely reconstructing porous media three-dimensional model based on slice images is proposed. It first processes the original slice images, then uses 3D seed filling algorithm to find all...
详细信息
Multi-hop infrastructure wireless mesh networks offer increased reliability, coverage and reduced equipment costs over their single-hop counterpart, wireless LANs. Equipping wireless routers with multiple radios furth...
详细信息
ISBN:
(纸本)0863416446
Multi-hop infrastructure wireless mesh networks offer increased reliability, coverage and reduced equipment costs over their single-hop counterpart, wireless LANs. Equipping wireless routers with multiple radios further improves the capacity by transmitting over multiple radios simultaneously using orthogonal channels. However, due to the limited number of available orthogonal channels, interference is still a factor in such networks. In this paper, we propose a network model that captures the key practical aspects of such systems and characterize the constraints binding their behavior. We mathematically formulate the optimization framework, taking into account the interference constraints, the number of channels in the network and the number of radios available at each mesh router etc. We then use this framework to develop solutions for multiple objectives subject to different kind of fairness constraints on allocation of scarce wireless capacity among mobile clients. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.
The accuracy of face alignment affects greatly the performance of a face recognition system. Since the face alignment is usually conducted using eye positions, the algorithm for accurate eye localization is therefore ...
详细信息
暂无评论