By researching Voronoi diagram, parallel algorithm, and divide-and-conquer method, we present a special data structure(change doubly-connected list little) for Voronoi diagram generation in parallel. In this paper we ...
详细信息
Despite recent advances in high-resolution (HR) face recognition, recognizing identities from low-resolution (LR) facial images remains challenging due to the absence of facial shape and detail. Current research focus...
详细信息
Although the mean square error (mse) of heatmap is an intuitive loss for heatmap-based human pose estimation, the joints localization accuracy may not be improved when heatmap mse reduces. In this paper, we show that ...
详细信息
The three dimensional stratum modeling provides important basis of analysis and policy-making in areas such as Geophysics, Petroleum, Minerals, Urban construction and so on. In this paper, we firstly propose a general...
详细信息
Buffer overflow (BOF) is one of the major vulnerabilities that lead to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying reasons of buffer overflow vary widely. Th...
详细信息
Current works on multimodal facial expression recognition typically require paired visible and thermal facial images. Although visible cameras are readily availab.e in our daily life, thermal cameras are expensive and...
详细信息
Testing is a critical activity to find software errors. And choosing an effective test suite is the key problem in software testing area. Program invariant, as an attribute of program, can record the implementation st...
详细信息
Testing is a critical activity to find software errors. And choosing an effective test suite is the key problem in software testing area. Program invariant, as an attribute of program, can record the implementation state of test case very well and reveal the coverage of program data. In this paper, we integrate adaptive random testing and invariant technology, and present a new method which makes full use of the feedback information of program invariant and invalid case suite to generate the next case. Experiment results show that, compared with other similar methods, running for the same time, our method can achieve higher coverage and faster convergence speed.
Appropriate dealing with boundary conditions is very important for SPH. Current boundary treatment methods like boundary force method, ghost particle method and virtual boundary layer method, when dealing with com...
详细信息
ISBN:
(纸本)9781424470815;9780769540474
Appropriate dealing with boundary conditions is very important for SPH. Current boundary treatment methods like boundary force method, ghost particle method and virtual boundary layer method, when dealing with complex boundaries, they will have to compute much on putting external particles. For resolving this problem, we propose a new method assuming part of boundary surface instead of external particles, called effective force surface, directly repels the internal particles which approach sufficiently close. We call this new method EFS method. It is implemented in the SPH model for simulating fluid in rabbit-type cup and dam-breaking. In the former case, liquid flows vividly and no internal particles penetrate boundaries. In the latter case, the result is similar to existing result. The experimental results show that EFS method can effectively and precisely deal with complex boundary conditions.
The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper pres...
详细信息
The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper presents an efficient algorithm based on the malefactor's access level vector in every host of the network to generate a reduced attack graph in polynomial compute complexity. In this algorithm, the state space is reduced to O(nm) , where n is the number of nodes and m is the whole number of vulnerabilities in the network. We also present a standard method to generate attack templates from the vulnerabilities.
The inherent dependencies among video content, personal characteristics, and perceptual emotion are crucial for personalized video emotion tagging, but have not been thoroughly exploited. To address this, we propose a...
详细信息
ISBN:
(纸本)9781509041183
The inherent dependencies among video content, personal characteristics, and perceptual emotion are crucial for personalized video emotion tagging, but have not been thoroughly exploited. To address this, we propose a novel topic model to capture such inherent dependencies. We assume that there are several potential human factors, or "topics," that affect the personal characteristics and the personalized emotion responses to videos. During training, the proposed topic model exploits the latent space to model the relationships among personal characteristics, video content and video tagging behaviors. After learning, the proposed model can generate meaningful latent topics, which help personalized video emotion tagging. Efficient learning and inference algorithms of the model are proposed. Experimental results on the CP-QAE-I database demonstrate the effectiveness of the proposed approach in modeling complex relationships among video content, personal characteristics, and perceptual emotion, as well as its good performance in personalized video emotion.
暂无评论