With the exponential growth and availability of sports video data, the need for video analysis has become crucial. Sports video classification is one of the most challenging problems among computer vision researchers....
详细信息
Federated Learning (FL) is typically deployed in a client-server architecture, which makes the Edge-Cloud architecture an ideal backbone for FL. A significant challenge in this setup arises from the diverse data ...
详细信息
This paper describes a corpus consisting of real-world dialogues in English between users and a task-oriented conversational agent, with interactions revolving around the description of finite state automata. The crea...
详细信息
Current mobile applications(apps) have become increasingly complicated with increasing features that are represented on the graphical user interface associated with application programming interfaces(APIs) to access b...
详细信息
Current mobile applications(apps) have become increasingly complicated with increasing features that are represented on the graphical user interface associated with application programming interfaces(APIs) to access backend functionality and data. Meanwhile, apps suffer from the “software bloat” in volume. Some app features may be redundant, with respect to those features(from other apps) that the users already desirably and frequently use. However, the current app release model forces users to download and install a full-size installation package rather than optionally choosing only their desired features. Large-size apps can not only increase the local resource consumption, such as CPU, memory, and energy, but also inevitably compromise the user experience, such as the slow load time in the app. In this article, we first conduct an empirical study to characterize the app feature usage when users interact with Android apps,and surprisingly find that users access only a very small subset of app features. Based on these findings,we design a new approach named Lego Droid, which automatically decomposes an Android app for flexible loading and installation, while preserving the expected functionality with a fast and instant app load. With such a method, a slimmer bundle will be downloaded and host the target APIs inside the original app to satisfy users' requirements. We implement a system for Lego Droid and evaluate it with 1000 real-world Android apps. Compared to the original full-size apps, apps optimized by Lego Droid can substantially improve the load time by reducing the base bundle and feature bundles by 13.06% and 10.93%, respectively,along with the app-package installation size by 44.17%. In addition, we also demonstrate that Lego Droid is quite practical with evolving versions, as it can produce substantial reusable code to alleviate the developers' efforts when releasing new app versions.
Face recognition is a widely studied field in biometrics that has achieved notable success in controlled environments. However, challenges arise when faced with uncontrolled conditions such as facial expressions, occl...
详细信息
The inevitability and imminent widespread adoption of autonomous vehicles are acknowledged, yet human supervision in driving remains crucial for the foreseeable future. Assessing a driver's capacity to take contro...
详细信息
Botnet attacks have become a major threat to the Internet of Things (IoT) over the past few years. Malicious operations, attacks, data loss, and network compromise are all possible outcomes of botnets. This paper pres...
详细信息
This study introduces the Hybrid Recurrent Ensemble Depth (HyRED) framework to enhance crop yield prediction in Iraq by integrating diverse environmental and agricultural parameters. The analysis utilises the Valued A...
详细信息
Artificial intelligence (AI) has revolutionized various scientific fields, including healthcare. In particular, deep learning (DL) algorithms have shown remarkable potential in medical imaging, enabling accurate disea...
详细信息
Secure k-Nearest Neighbor(k-NN)query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing privacy to the untrusted cloud and has wide applications in many areas,s...
详细信息
Secure k-Nearest Neighbor(k-NN)query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing privacy to the untrusted cloud and has wide applications in many areas,such as privacy-preservingmachine elearning gand secure biometric *** solutions have been put forward to solve this challenging ***,the existing schemes still suffer from various limitations in terms of efficiency and *** this paper,we propose a new encrypt-then-index strategy for the secure k-NN query,which can simultaneously achieve sub-linear search complexity(efficiency)and support dynamical update over the encrypted database(flexibility).Specifically,we propose a novel algorithm to transform the encrypted database and encrypted query points in the *** indexing the transformed database using spatial data structures such as the R-tree index,our strategy enables sub-linear complexity for secure k-NN queries and allows users to dynamically update the encrypted *** the best of our knowledge,the proposed strategy is the first to simultaneously provide these two *** theoretical analysis and extensive experiments,we formally prove the security and demonstrate the efficiency of our scheme.
暂无评论