In the multi-armed bandit (MAB) framework, we investigate the problem of learning the means of distributions that are associated with a finite n umber o f a rms under a monotonic constraint. Different from the traditi...
详细信息
Recent trends in Network Function Virtualization (NFV) combined with Internet of Things (IoT) and 5G applications have reshaped the network service offering. In particular, Service Function Chains (SFCs) can associate...
详细信息
Recently, Chang et al. proposed a Sudoku-based secret image sharing scheme. They utilized the Sudoku grid to generate meaningful shadow images, and their scheme satisfied all essential requirements. Based on Chang et ...
详细信息
Recently, Chang et al. proposed a Sudoku-based secret image sharing scheme. They utilized the Sudoku grid to generate meaningful shadow images, and their scheme satisfied all essential requirements. Based on Chang et al.'s scheme, we propose a novel (n, n) secret image sharing scheme based on Sudoku. In the proposed scheme, a secret image can be shared among n different cover images by generating n shadow images, and the secret image can be reconstructed without distortion using only these n shadow images. Also, the proposed scheme can solve the overflow and underflow problems. The experimental results show that the visual quality of the shadow images is satisfactory. Furthermore, the proposed scheme allows for a large embedding capacity.
With the continuous development of the field of computer vision and the need for the accuracy and timeliness of model recognition in practical applications, YOLOv3 draws on YOLOvl and YOLOv2. Although there are not ma...
详细信息
Writing specifications using Java Modeling Language has been accepted for a long time as a practical approach to increasing the correctness and quality of Java programs. However, the current JML testing system (the JM...
详细信息
A Call Data Record (CDR) is produced for each call (or other interaction) handled by a telephone company. CDRs have traditionally been used for billing and network engineering purposes. Given how mobile phones have be...
详细信息
Automated composition of Semantic Web services has become one of the recent critical issues in today's Web environment. Despite the importance of AI-planning techniques for Web service composition, previous works ...
详细信息
The Grid Modeling and Simulation (GridSim) toolkit provides a comprehensive facility for simulation of application scheduling in different Grid computing environments. However, using the GridSim toolkit to create a Gr...
详细信息
Cloud computing is becoming more and more mature, and an IaaS could computing model called Cloud Bank [1], which is based on commercial bank model, has been designed. Could Bank model can be partly distinguished from ...
详细信息
Visualization of architectural design decision (ADD) and its rationale, as a kind of traceability information, is supposed to facilitate the understanding of architecture design and the reasoning behind the design rat...
详细信息
暂无评论