Perceiving scene depth and 3D structure is one of the key tasks for Internet of Video Things (IoVT) devices to understand and interact with the environment. Self-supervised monocular depth estimation has demonstrated ...
详细信息
Perceiving scene depth and 3D structure is one of the key tasks for Internet of Video Things (IoVT) devices to understand and interact with the environment. Self-supervised monocular depth estimation has demonstrated significant potential in leveraging large-scale unlabeled datasets to achieve competitive performance, thereby playing an increasingly important role in depth estimation. Despite recent methods providing additional supervisory signals through self-distillation strategies to improve depth estimation, an effective method for generating pseudo-depth labels suitable for addressing occlusion issues among elements far from the camera remains unexplored. To address this limitation, we propose a Patch-based Self-Distillation Learning Framework to exploit the potential of self-supervised monocular depth estimation in recovering fine-grained scene depth. In the proposed framework, elements far from the camera within the input image are enlarged by enlarging and cropping operations in the patch-based self-distillation branch. Guided by photometric consistency, the model learns the detailed occlusion relationships among elements from the enlarged patches, producing patch depth maps with fine structures. In the main branch, which takes full-scale images as input, patch depth maps serve as pseudo-depth labels through self-distillation loss to provide additional supervisory signals for regions where photometric consistency fails to offer effective supervision. This forces the depth estimation network to recover fine structures of elements far from the camera in full-scale input images. Regarding the architecture of the depth estimation network, we introduce a bin-center prediction. In this prediction, a global aggregator based on self-attention provides additional scene structure queries for adaptive scene depth discretization. Finally, to encourage the model to explore more general cues for depth inference beyond road plane cues, we propose a PatchMix data augmentati
Nowadays, access control to Web pages relay mostly on identification and authentication. After successful authentication, however, subsequent access may not necessarily be performed by the same user. Aimed at separati...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
Nowadays, access control to Web pages relay mostly on identification and authentication. After successful authentication, however, subsequent access may not necessarily be performed by the same user. Aimed at separating identity authentication and behavior authentication in open network environments, this paper proposes an access control method based on the analysis of user behavior in Web browsing as an additional access control mechanism to traditional identity authentication. The paper provides the definition of user behavior, uses browsing time and navigated path to determine the normality of user behavior based on the result of comparing the value calculated using a proposed algorithm with a threshold, thus modeling user behavior in both temporal and spatial dimensions. The proposed method relies on a database that contains the frequency of previous access to the path by the same user. Experiment shows that the proposed method can detect abnormal behavior while adapting to continuous changes in user behavior and can thus be used to prevent the theft of user accounts to improve network security.
"Requirements" are one of the major reasons for software-intensive system failures. Most of the requirements related problems emerge as results of changing requirements. To manage changing requirements in a ...
详细信息
ISBN:
(纸本)9780889866416
"Requirements" are one of the major reasons for software-intensive system failures. Most of the requirements related problems emerge as results of changing requirements. To manage changing requirements in a better way many requirements change management (RCM) process models have been proposed in the literature. Process models facilitate human understating and communication, supporting process improvement and process management. Coverage of process elements and representational perspectives has an affect on process model. This paper reports evaluation of current requirements change management process models present in the literature on the basis of process model elements and representations. The aim is to highlight deficiencies in the current RCM process models, and to propose process ontology and the use of business process modeling notion (BPMN) to model RCM process.
Access control models provide a formalism and framework for specifying control over access to information and other resources in multi-user computer systems. Useful access control models must balance expressive power ...
Current software cost estimation models, such as the 1981 Constructive Cost Model (COCOMO) for software cost estimation and its 1987 Ada COCOMO update, have been experiencing increasing difficulties in estimating the ...
详细信息
Polyinstantiation has generated a great deal of controversy lately. Some have argued that polyinstantiation and integrity are fundamentally incompatible, and have proposed alternatives to polyinstantiation. Others hav...
详细信息
The Chinese Wall policy was identified and so named by Brewer and Nash. This policy arises in the financial segment of the commercial sector, which provides consulting services to other companies. Consultants naturall...
详细信息
Currently there exist dozens of techniques for the specification of software and system-level requirements. While there are unique aspects to every requirements technique that make it appropriate for a particular use,...
详细信息
Accelerating development schedules is increasingly important in a competitive world. Reduced time-to-market is a key response to competitive threats in the commercial sphere, and rapid response in deploying military s...
详细信息
ISBN:
(纸本)9781450320627
Accelerating development schedules is increasingly important in a competitive world. Reduced time-to-market is a key response to competitive threats in the commercial sphere, and rapid response in deploying military systems may save lives in a geopolitical environment characterized by rapidly emerging and everchanging physical threats. Agile/lean development methodologies show promise in providing the desired schedule acceleration, but it can be difficult for planners to determine the effects of these factors on schedule duration, and to make appropriate choices to optimize project performance. The Constructive Rapid Application Development Model (CORADMO) attempts to quantify the effects of key schedule drivers, and thus enable planners to estimate the relative schedule that will result from varying these parameters. Copyright 2013 ACM.
暂无评论