Face annotation for personal photos has a number of potential applications in Multimedia Information Retrieval (MIR). We propose a novel face annotation method that systematically combines contextual information of ph...
详细信息
ISBN:
(纸本)9781605583129
Face annotation for personal photos has a number of potential applications in Multimedia Information Retrieval (MIR). We propose a novel face annotation method that systematically combines contextual information of photos with traditional Face Recognition (FR) technologies. To overcome the limitations of conventional FR-based annotation approaches, situation and person clustering methods are proposed based on context of personal photos. By relying on the proposed clustering methods, multiple facial images that belong to the same person are applied to subspace FR methods. This allows traditional FR methods to take advantages of feature- or measurement-level fusion strategies for automatic annotation of faces on personal photos. The effectiveness of the proposed method was successfully tested on 1,120 personal photos selected from standard MPEG-7 Visual Core Experiment 3 (VCE-3). Extensive experimental results showed that the proposed method improves annotation accuracy by at least an order of magnitude, compared with conventional FR-based approaches. Copyright 2008 ACM.
This paper proposes an agent-based simulation model to analyze how team management affects performances of the team with three fundamental parameters: team size, skill combination among team members and task structure...
详细信息
This paper proposes an agent-based simulation model to analyze how team management affects performances of the team with three fundamental parameters: team size, skill combination among team members and task structure. The results confirmed are as follows: first, communication cost increases when the team size grows, and team-workers benefit from a right team size to obtain higher productivity;second, each team member has more chances to receive tasks that he/she is good at and then strengthen this skill ability by accumulative experience;third, a team shows more efficiency and robustness under a task environment where both workload and sub-task variety get to a balanceable distribution in a long term.
Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for ...
详细信息
ISBN:
(纸本)1601320914
Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.
Integrins are transmembrane glycoproteins made of non-covalently bonded α and β chains involved in fundamental biological processes such as cell growth, tissue development and wound repair. The expression of proper ...
详细信息
Nanometer technology is gradually being applied after deep submicron technology due to the rapid progress of the VLSI fabrication process. Recently, system- on-a-chip (SoC) based products are gaining more advantages s...
详细信息
Mobile agent has been adopted in the field of intrusion detection system primarily to resist against distributed attacks and makes it more flexible and scalable. Mineral models has been proposed. However, common short...
详细信息
Mobile agent has been adopted in the field of intrusion detection system primarily to resist against distributed attacks and makes it more flexible and scalable. Mineral models has been proposed. However, common shortcoming exist with these models like dependency on a central node or hierarchical decision making which cause to single point of failure. increasing the load of network and disability to detect sophisticated attacks. A central coordinator mobile agents architecture and neighborhood watch in virtual areas are two potential concepts that could overcome the limitation of existing models. In this work a coordinator association approach for mobile agent based IDS will be presented. The merits of this approach will be compared against existing IDSs and implementation and configuration issues will be discussed detail.
AND subtraction technique is proposed and presented in this paper. The theory is being elaborated and the simulation results have been done by comparing AND subtraction technique against Complementary subtraction tech...
详细信息
ISBN:
(纸本)9780889867345
AND subtraction technique is proposed and presented in this paper. The theory is being elaborated and the simulation results have been done by comparing AND subtraction technique against Complementary subtraction technique by using DW code. The result shows that the OSNR for AND subtraction technique give 39.5 dB at 10 km, while Complementary technique is only 24.5 dB. In this paper we have proved that AND subtraction technique gives better optical signal to noise ratio (OSNR) performance due to reduce the multiple access interference (MAI) compared to the Complementary subtraction technique.
Scientists has largely understand the structure of glass and the ion trajectories has largely relied on statistical analysis of data collected from experimental measurement and computer simulation [1][2]. Invariably, ...
详细信息
The acknowledgment strategy has great potential to increase the TCP throughput when it runs over 802.11 MAC protocol. In particular, TCP acknowledgments carry out an extensive number of medium accesses as they compete...
详细信息
ISBN:
(纸本)9780769534282
The acknowledgment strategy has great potential to increase the TCP throughput when it runs over 802.11 MAC protocol. In particular, TCP acknowledgments carry out an extensive number of medium accesses as they compete in the same route as data packets for media. As the load increases, the well-known hidden terminal effects caused by interference between ACK and data packets in MAC layer can degrade TCP performance dramatically if TCP acknowledges every incoming data packets. In this paper a dynamic TCP-MAC interaction strategy has been proposed which tries to reduce the number of induced ACKs by monitoring the channel condition. To this end, the total collision probability collected along the path from sender to receiver in MAC layer has been used to properly set the number of delayed ACKs (DA) in TCP. Based on the measured collision probability, TCP sender dynamically adjusts itself to the channel condition by delaying less ACKs in high traffics and more in low traffic conditions. The simulation results show a throughput improvement up to 15% over the existing method called dynamic adaptive acknowledgment (TCP-DAA) and much more over the regular TCP in the scenarios dealing with a dynamic loss rate.
This paper elaborates on context assessment strategies for smart homes and, in a broader perspective, for context-aware cognitive systems. The proposed framework, which is inspired by a cognitive theory called functio...
详细信息
This paper elaborates on context assessment strategies for smart homes and, in a broader perspective, for context-aware cognitive systems. The proposed framework, which is inspired by a cognitive theory called functionalism, is aimed at integrating ontology and logic approaches to context modeling. Two are the assumptions underlying the model: (i) the availability of an ontology (i.e., a "context-role" representation of what exists in a given domain); (ii) a simple inference schema (i.e., subsumption between concepts). The context model is formally defined adopting a structural approach, which describes contexts and situations as recursive structures grounded with respect to the ontology. Examples are presented to discuss the proposed model.
暂无评论