We propose a new approach for measuring similarity between two signals, which is applicable to many machine learning tasks, and to many signal types. We say that a signal S1 is "similar" to a signal S 2 if i...
详细信息
ISBN:
(纸本)9780262195683
We propose a new approach for measuring similarity between two signals, which is applicable to many machine learning tasks, and to many signal types. We say that a signal S1 is "similar" to a signal S 2 if it is "easy" to compose S1 from few large contiguous chunks of S2. Obviously, if we use small enough pieces, then any signal can be composed of any other. Therefore, the larger those pieces are, the more similar S1 is to S2. This induces a local similarity score at every point in the signal, based on the size of its supported surrounding region. These local scores can in turn be accumulated in a principled information-theoretic way into a global similarity score of the entire S1 to S2. "Similarity by Composition" can be applied between pairs of signals, between groups of signals, and also between different portions of the same signal. It can therefore be employed in a wide variety of machine learning problems (clustering, classification, retrieval, segmentation, attention, saliency, labelling, etc.), and can be applied to a wide range of signal types (images, video, audio, biological data, etc.) We show a few such examples.
This paper describes a graphical data mining system called AutoDomainMine. It is based on our proposed approach of integrating clustering and classification to mine scientific data stored in a database. The data consi...
详细信息
ISBN:
(纸本)1595936866
This paper describes a graphical data mining system called AutoDomainMine. It is based on our proposed approach of integrating clustering and classification to mine scientific data stored in a database. The data consists of input conditions of scientific experiments and graphs plotted as their results. This system mines the stored data in order to submit exact or approximate ranked responses to user queries intended to optimize the scientific processes.
This paper analyzes the interactions between the protocol stack (TCP/IP or iWARP over 10-Gigabit Ethernet) and its multicore environment. Specifically, for host-based protocols such as TCP/IP, we notice that a signifi...
详细信息
This paper analyzes the interactions between the protocol stack (TCP/IP or iWARP over 10-Gigabit Ethernet) and its multicore environment. Specifically, for host-based protocols such as TCP/IP, we notice that a significant amount of processing is statically assigned to a single core, resulting in an imbalance of load on the different cores of the system and adversely impacting the performance of many applications. For host-offloaded protocols such as iWARP, on the other hand, the portions of the communication stack that are performed on the host, such as buffering of messages and memory copies, are closely tied with the associated process, and hence do not create such load imbalances. Thus, in this paper, we demonstrate that by intelligently mapping different processes of an application to specific cores, the imbalance created by the TCP/IP protocol stack can be largely countered and application performance significantly improved. At the same time, since the load is a better balanced in host-offloaded protocols such as iWARP, such mapping does not adversely affect their performance, thus keeping the mapping generic enough to be used with multiple protocol stacks.
We introduce classes of graphs with bounded expansion as a generalization of both proper minor closed classes and degree bounded classes. Such classes are based on a new invariant, the greatest reduced average density...
详细信息
The paper aims to obtain existence and uniqueness of the solution as well as asymptotic estimate of the solution for singularly perturbed nonlinear thirdorder Robin boundary value problem with a turning point. In orde...
详细信息
The paper aims to obtain existence and uniqueness of the solution as well as asymptotic estimate of the solution for singularly perturbed nonlinear thirdorder Robin boundary value problem with a turning point. In order to achieve this aim, existence and uniqueness of the solution for third-order nonlinear Robin boundary value problem is derived first based on the upper and lower solutions method under relatively weaker conditions. In this manner, the goal of this paper is gained by applying the existence and uniqueness results mentioned above.
We present an approach for measuring similarity between visual entities (images or videos) based on matching internal self-similarities. What is correlated across images (or across video sequences) is the internal lay...
详细信息
We present an approach for measuring similarity between visual entities (images or videos) based on matching internal self-similarities. What is correlated across images (or across video sequences) is the internal layout of local self-similarities (up to some distortions), even though the patterns generating those local self-similarities are quite different in each of the images/videos. These internal self-similarities are efficiently captured by a compact local "self-similarity descriptor"', measured densely throughout the image/video, at multiple scales, while accounting for local and global geometric distortions. This gives rise to matching capabilities of complex visual data, including detection of objects in real cluttered images using only rough hand-sketches, handling textured objects with no clear boundaries, and detecting complex actions in cluttered video data with no prior learning. We compare our measure to commonly used image-based and video-based similarity measures, and demonstrate its applicability to object detection, retrieval, and action detection.
Interactive hashing, introduced by Naor, Ostrovsky, Venkatesan and Yung (CRYPTO '92), plays an important role in many cryptographic protocols. In particular, it is a major component in all known constructions of s...
详细信息
Interactive hashing, introduced by Naor, Ostrovsky, Venkatesan and Yung (CRYPTO '92), plays an important role in many cryptographic protocols. In particular, it is a major component in all known constructions of statistically- hiding commitment schemes and of zero-knowledge arguments based on general one-way permutations and on one- way functions. Interactive hashing with respect to a one-way permutation f, is a two-party protocol that enables a sender that knows y = f(x) to transfer a random hash z = h(y) to a receiver. The receiver is guaranteed that the sender is committed to y (in the sense that it cannot come up with x and x' such that f(x) Dagger f(x') but h(f(x)) = h(f(x')) = z). The sender is guaranteed that the receiver does not learn any additional information on y. In particular, when h is a two-to-one hash function, the receiver does not learn which of the two pre images {y,y'} = h -1 (z) is the one the sender can invert with respect to f. This paper reexamines the notion of interactive hashing. We give an alternative proof for the Naor et. al. protocol, which seems to us significantly simpler and more intuitive than the original one. Moreover, the new proof achieves much better parameters (in terms of how security preserving the reduction is). Finally, our proof implies a more versatile interactive hashing theorem for a more general setting than that of the Naor et. al. protocol. One generalization relates to the selection of hash function h (allowing much more flexibility). More importantly, the theorem applies to the case where the underlying function f is hard- to-invert only on some given (possibly sparse) subset of the output strings. In other words, the theorem is tuned towards hashing of a value y that may be distributed over a sparse subset of the domain (rather than uniform on the entire domain as a random output of a one-way permutation is). Our interest in interactive hashing is in part as a very appealing object (i.e., independent of any pa
This paper applies the idea of normal mesh techniques, utilized in CG rendering applications of smooth manifolds in 3d space, to piecewise smooth functions defined on the plane. The nonsmoothness of these functions is...
详细信息
ISBN:
(纸本)9789898109057
This paper applies the idea of normal mesh techniques, utilized in CG rendering applications of smooth manifolds in 3d space, to piecewise smooth functions defined on the plane. The nonsmoothness of these functions is located along a smoothly varying curve in the domain. The nonlinear nature of the proposed method allows to deal with the 'regularity' of the curve. The smooth curve is approximated by a polyline existing of triangle edges of the adaptively created nested triangulations. The proposed method can be used in transform coders generating sparse representations of piecewise smooth colored images. We state a full compression algorithm to encode images where all information is located in one smooth contour.
In this article we present a novel packet scheduling algorithm LBFS-DRR, which combines features from the Last-Come First-Served scheduling discipline and the Deficit Round Robin (DRR) algorithm. In comparison with DR...
详细信息
ISBN:
(纸本)9781424412297;1424412293
In this article we present a novel packet scheduling algorithm LBFS-DRR, which combines features from the Last-Come First-Served scheduling discipline and the Deficit Round Robin (DRR) algorithm. In comparison with DRR it provides lower average packet delay, while preserving the advantageous feature like O(l) complexity, fairness, bandwidth guarantee. The lower mean delay is realized by giving service in a round first to flows transmitting bellow their (weighted) fair share. The algorithm exploits the high variability in the typical user traffic pattern resulting in lower mean file transfer delay.
In this paper, we present a fast and robust algorithm for centerline extraction in blood vessels. The algorithm is suitable for catheter simulation in CT data of blood vessels. It creates an initial centerline based o...
详细信息
In this paper, we present a fast and robust algorithm for centerline extraction in blood vessels. The algorithm is suitable for catheter simulation in CT data of blood vessels. It creates an initial centerline based on two user-defined points (start- and endpoint). For curved vessel structures, this initial centerline is computed by Dijkstra's shortest path algorithm. For linear vessel structures, the algorithm directly connects the start- and the endpoint to get the initial centerline. Thereafter, this initial path will be aligned in the blood vessel, resulting in the vessels centerline (i.e. an optimal catheter simulation path). The alignment is done by an active contour model combined with polyhedra placed along it. Results of the proposed centerline algorithm are demonstrated for CTA with variations in anatomy and location of pathology.
暂无评论