The authors ask what is the complexity of computing equilibria for physically realizable analog networks like those of J.J. Hopfield (1984) and T.J. Sejnowski (1981) with arbitrary connectivity. It is shown that, if t...
详细信息
The authors ask what is the complexity of computing equilibria for physically realizable analog networks like those of J.J. Hopfield (1984) and T.J. Sejnowski (1981) with arbitrary connectivity. It is shown that, if the amplifiers are piecewise-linear, then such networks are instances of a game-theoretic model known as polymatrix games. Equilibria for the latter may be computed by vertex pivoting algorithms similar to the simplex method for linear programming, which are in practice of low order polynomial complexity. These algorithms appear to be the only ones both guaranteed to work and which are polynomial in practice. These results suggest that networks with few nonstable equilibria would be computationally attractive.< >
The 2nd International Workshop on Statistical Methods in Video Processing, SMVP 2004, was held in Prague, Czech Republic, as an associated workshop of ECCV 2004, the 8th European Conference on computervision. A total...
详细信息
ISBN:
(数字)9783540302124
ISBN:
(纸本)9783540239895
The 2nd International Workshop on Statistical Methods in Video Processing, SMVP 2004, was held in Prague, Czech Republic, as an associated workshop of ECCV 2004, the 8th European Conference on computervision. A total of 30 papers were submitted to the workshop. Of these, 17 papers were accepted for presentation and included in these proceedings, following a double-blind review process. The workshop had 42 registered participants. The focus of the meeting was on recent progress in the application of - vanced statistical methods to solve computervision tasks. The one-day scienti?c program covered areas of high interest in visionresearch, such as dense rec- struction of 3D scenes, multibody motion segmentation, 3D shape inference, errors-in-variables estimation, probabilistic tracking, information fusion, optical ?owcomputation,learningfornonstationaryvideodata,noveltydetectionin- namic backgrounds, background modeling, grouping using feature uncertainty, and crowd segmentation from video. We wish to thank the authors of all submitted papers for their interest in the *** external reviewers for their commitment of time and e?ort in providing valuable recommendations for each submission. We are thankful to Vaclav Hlavac, the General Chair of ECCV 2004, and to Radim Sara, for the local organization of the workshop and registration management. We hope you will ?nd these proceedings both inspiring and of high scienti?c quality.
The pervasive creation and consumption of content, especially visual content, is ingrained into our modern world. We’re constantly consuming visual media content, in printed form and in digital form, in work and in l...
详细信息
ISBN:
(数字)9783642151811
ISBN:
(纸本)9783642151804;9783642264634
The pervasive creation and consumption of content, especially visual content, is ingrained into our modern world. We’re constantly consuming visual media content, in printed form and in digital form, in work and in leisure pursuits. Like our cave– man forefathers, we use pictures to record things which are of importance to us as memory cues for the future, but nowadays we also use pictures and images to document processes; we use them in engineering, in art, in science, in medicine, in entertainment and we also use images in advertising. Moreover, when images are in digital format, either scanned from an analogue format or more often than not born digital, we can use the power of our computing and networking to exploit images to great effect. Most of the technical problems associated with creating, compressing, storing, transmitting, rendering and protecting image data are already solved. We use - cepted standards and have tremendous infrastructure and the only outstanding ch- lenges, apart from managing the scale issues associated with growth, are to do with locating images. That involves analysing them to determine their content, clas- fying them into related groupings, and searching for images. To overcome these challenges we currently rely on image metadata, the description of the images, - ther captured automatically at creation time or manually added afterwards.
Microservice architectures are increasingly used to modularize IoT applications and deploy them in distributed and heterogeneous edge computing environments. Over time, these microservice-based IoT applications are su...
详细信息
Microservice architectures are increasingly used to modularize IoT applications and deploy them in distributed and heterogeneous edge computing environments. Over time, these microservice-based IoT applications are susceptible to performance anomalies caused by resource hogging (e.g., CPU or memory), resource contention, etc., which can negatively impact their Quality of Service and violate their Service Level Agreements. Existing research on performance anomaly detection for edge computing environments focuses on model training approaches that either achieve high accuracy at the expense of a time-consuming and resource-intensive training process or prioritize training efficiency at the cost of lower accuracy. To address this gap, while considering the resource constraints and the large number of devices in modern edge platforms, we propose two clustering-based model training approaches: (1) intra-cluster parameter transfer learning-based model training (ICPTL) and (2) cluster-level model training (CM). These approaches aim to find a trade-off between the training efficiency of anomaly detection models and their accuracy. We compared the models trained under ICPTL and CM to models trained for specific devices (most accurate, least efficient) and a single general model trained for all devices (least accurate, most efficient). Our findings show that ICPTL’s model accuracy is comparable to that of the model per device approach while requiring only 40% of the training time. In addition, CM further improves training efficiency by requiring 23% less training time and reducing the number of trained models by approximately 66% compared to ICPTL, yet achieving a higher accuracy than a single general model.
The aortic vessel tree, composed of the aorta and its branches, is crucial for blood supply to the body. Aortic diseases, such as aneurysms and dissections, can lead to life-threatening ruptures, often requiring open ...
详细信息
The aortic vessel tree, composed of the aorta and its branches, is crucial for blood supply to the body. Aortic diseases, such as aneurysms and dissections, can lead to life-threatening ruptures, often requiring open surgery. Therefore, patients commonly undergo treatment under constant monitoring, which requires regular inspections of the vessels through medical imaging techniques. Overlapping and comparing aortic vessel tree geometries from consecutive images allows for tracking changes in both the aorta and its branches. Manual reconstruction of the vessel tree is time-consuming and impractical in clinical settings. In contrast, automatic or semi-automatic segmentation algorithms can perform this task much faster, making them suitable for routine clinical use. This paper systematically reviews methods for the automatic and semi-automatic segmentation of the aortic vessel tree, concluding with a discussion on their clinical applicability, the current research landscape, and ongoing challenges.
The book covers current developments in the field of expert applications and security, which employ advances of next-generation communication and computational technology to shape real-world applications. It gathers s...
详细信息
ISBN:
(数字)9789811322853
ISBN:
(纸本)9789811322846
The book covers current developments in the field of expert applications and security, which employ advances of next-generation communication and computational technology to shape real-world applications. It gathers selected research papers presented at the ICETEAS 2018 conference, which was held at Jaipur Engineering College and research Centre, Jaipur, India, on February 17–18, 2018. Key topics covered include expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security and intelligence; and advances in web technologies: implementation and security issues.
暂无评论