In a 3D environment, when a 2D figure is pho- tographed from different camera angles, the pictures have a relation that approximates an affine transformation. Detecting an affine transformation is an important problem...
详细信息
In a 3D environment, when a 2D figure is pho- tographed from different camera angles, the pictures have a relation that approximates an affine transformation. Detecting an affine transformation is an important problem in the area of computer vision. The log-polar transform is known to be a model of the central-fovea visual sensor in a creature's vision. One study described a method to detect the affine parameter by using a log-polar transform: however, this transform is not invariant to obiect position. so it is necessary to find beforehand the corresponding characteristic point. In this studv. a new log-polar transform method which is invariant to obiect position chance and affine transform is described. One amplitude feature in the frequency domain, the orientation of the 2D figure is retained but chance of position is not retained, so the orientation can be detected regardless of the position of the figure. By combination with edge extraction, the affine parameter can be detected with little effect by a background chance.
Cloud computing brings in a novel paradigm to foster IT-based service economy in scalable computing infrastructures by allowing guaranteed on-demand resource allocation with flexible pricing models. Scalable computing...
详细信息
Detecting events from web resources is a challenging task, attracting many attentions in recent years. Web search log is an important data source for event detection because the information it contains reflects users&...
详细信息
ISBN:
(纸本)9783642142451
Detecting events from web resources is a challenging task, attracting many attentions in recent years. Web search log is an important data source for event detection because the information it contains reflects users' activities and interestingness to various real world events. There are three major issues for event detection from web search logs: effectiveness, efficiency and the organization of detected events. In this paper, we develop a novel Topic and Event Detection method, TED, to address these issues. We first divide the whole data into topics for efficiency consideration, and then incorporate link information, temporal information and query content to ensure the quality of detected events. Finally, events detected are organized through the proposed interestingness measure as well as topics they belong to. Experiments are conducted on a commercial search engine log. The results demonstrate that our method can effectively and efficiently detect hot events and give a meaningful organization of them.
Traffic congestion is a very serious problem in large cities. With the number of vehicles increasing rapidly, especially in cities whose economy is booming, the situation is getting even worse. In this paper, by lever...
详细信息
The world of procurements and eProcurement generates daily large amounts of data, that represent knowledge of great economical value both for individual companies and for public organisations wishing to achieve a bett...
详细信息
The world of procurements and eProcurement generates daily large amounts of data, that represent knowledge of great economical value both for individual companies and for public organisations wishing to achieve a better understanding of a given market. However, such data remains dificult to explore and analyze as it is being kept isolated from other sources of knowledge, in dedicated systems. In this paper, we present an ongoing work on extracting and linking data from the European 'Tenders Electronic Daily' system, which publishes approximately 1,500 tenders five times a week. We specifically show how such information is dynamically extracted and linked to external datasets, and how the created links enrich the original data, introducing new perspectives to its analysis. We show tools we developed to support such 'linked data-based' analysis of data, and report on the lessons learnt from our experience in building a linked data application with potential for real-life use in knowledge extraction.
The requirements of OLAP applications increase rapidly by dramatically increased data volume, users, query volume and query complexity. The requirement for shortening update period in data warehouse is another crucial...
详细信息
The dominant standards in multimedia content and service description, namely the MPEG-7 and the MPEG-21, have been expressed in XML Schema syntax. In addition, ontologies that capture the semantics of these standards ...
详细信息
Business-to-Business (B2B) workflow/service interoperation across Virtual Organisations (VOs) brings about novel business scenarios. In these scenarios, parts of workflows (or services) corresponding to different part...
详细信息
In update intensive main memory database applications, huge volume of log records is generated, to maintain the ACID properties of the database system, the log records should be persistent efficiently. Delegating logg...
详细信息
ISBN:
(纸本)9788988678183
In update intensive main memory database applications, huge volume of log records is generated, to maintain the ACID properties of the database system, the log records should be persistent efficiently. Delegating logging of one main memory database to another main memory database is proposed. The scheme is elaborated in detail in terms of architecture, logging & safeness levels, checkpointing, and recovery. Strict durability and relax durability are provided. When some form of non-volatile memory is used to temporarily holding log records, not only logging efficiency is improved, but also the scheme could guarantee full ACID of the system. We also propose using parallel logging to speedup log persistence by writing logs to multiple disks in parallel. Since interconnection network techniques progress by leaps and bounds, the scheme eliminates the concern about whether the system's overall performance may be slowed down by bandwidth and latency limitations. Experiment results demonstrate the feasibility of the proposal.
This paper proposes using functional programming style in a way to respond to detection of and interaction with the software attacks and vulnerabilities. Additionally, our approach considers involving Description Logi...
详细信息
暂无评论