This paper presents a method for joint estimation of fiber and fines mass fractions (i.e. pulp consistency) in paper pulp suspension. The technique is based on a combination of optical and ultrasonic measurements. The...
详细信息
The workshop on architectures and platforms was organized at AMIN as a collaborative effort involving 4 projects (ASTRA, DAIDALOS, PERSIST, and Ubicollab). These projects address, in different ways, the challenge of d...
详细信息
ISBN:
(纸本)9783642106064
The workshop on architectures and platforms was organized at AMIN as a collaborative effort involving 4 projects (ASTRA, DAIDALOS, PERSIST, and Ubicollab). These projects address, in different ways, the challenge of developing platforms for Ambient Intelligence. The workshop aimed at bringing together the different perspectives gained in these projects, opening the discussion to the wider research community. In particular, focus has been on comparing and discussing lessons learned in the development of specific vs. generic platforms for AMI.
作者:
Carlson, Johan E.Hägglund, FredrikDiv. of Systems and Interaction
Dept. of Computer Science and Electrical Engineering Luleå University of Technology SE-971 87 Luleå Sweden EISLAB
Dept. of Computer Science and Electrical Engineering Luleå University of Technology SE-971 87 Luleå Sweden
Several model-based techniques have been proposed for characterizing thin layers within multi-layered materials. One problem with these methods is that the models are non-linear with respect to the parameters. Hence, ...
详细信息
In this paper we propose a novel approach for generating expressive caricatures from an input image. The novelty of this work comes from combining an Active Appearance Model facial feature extraction system with a qua...
详细信息
Raman amplifiers provide a simple and yet powerful platform for optical amplification needs in modern optical communication networks. This paper reviews recent progress in Raman amplifier research and highlights some ...
详细信息
This paper presents a method for estimating peak strain using EFPI fiber-optic sensors. The method involves directly synthesizing the optical phase difference from the measured interference signal. Empirical results a...
详细信息
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications ...
详细信息
ISBN:
(纸本)9781605583945
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications requiring delegation. However, it is inadequate to handle scenarios where a fine-grained delegation is demanded. To overcome the limitation of existing PRE systems, we introduce the notion of conditional proxy re-encryption (C-PRE), whereby only ciphertext satisfying a specific condition set by Alice can be transformed by the proxy and then decrypted by Bob. We formalize its security model and propose an efficient C-PRE scheme, whose chosen-ciphertext security is proven under the 3-quotient bilinear Diffie-Hellman assumption. We further extend the construction to allow multiple conditions with a slightly higher overhead. Copyright 2009 ACM.
To support more effective searches in large-scale weakly-tagged image collections, we have developed a novel algorithm to integrate both the visual similarity contexts between the images and the semantic similarity co...
详细信息
ISBN:
(纸本)9781605584805
To support more effective searches in large-scale weakly-tagged image collections, we have developed a novel algorithm to integrate both the visual similarity contexts between the images and the semantic similarity contexts between their tags for topic network generation and word sense disambiguation. First, a topic network is generated to characterize both the semantic similarity contexts and the visual similarity contexts between the image topics more sufficiently. By organizing large numbers of image topics according to their cross-modal inter-topic similarity contexts, our topic network can make the semantics behind the tag space more explicit, so that users can gain deep insights rapidly and formulate their queries more precisely. Second, our word sense disambiguation algorithm can integrate the topic network to exploit both the visual similarity contexts between the images and the semantic similarity contexts between their tags for addressing the issues of polysemes and synonyms more effectively, thus it can significantly improve the precision and recall rates for image retrieval. Our experiments on large-scale Flickr and LabelMe image collections have provided very positive results. Copyright 2009 ACM.
In this paper we show a platform which allows for education and training of a number of essential embedded skills. The Java optimized processor (JOP) is open source and has been used in several educational and trainin...
详细信息
We report a series of user studies that evaluate the feasibility and usability of light-weight user authentication with a single tri-axis accelerometer. We base our investigation on uWave, a state-ofthe- art recogniti...
详细信息
ISBN:
(纸本)9781605582818
We report a series of user studies that evaluate the feasibility and usability of light-weight user authentication with a single tri-axis accelerometer. We base our investigation on uWave, a state-ofthe- art recognition system for user-created free-space manipulation, or gestures. Our user studies address two types of user authentication: non-critical authentication (or identification) for a user to retrieve privacy-insensitive data;and critical authentication for protecting privacy-sensitive data. For non-critical authentication, our evaluation shows that uWave achieves high recognition accuracy (98%) and its usability is comparable with text IDbased authentication. Our results also highlight the importance of constraints for users to select their gestures. For critical authentication, the evaluation shows uWave achieves state-of-the-art resilience to attacks with 3% false positives and 3% false negatives, or 3% equal error rate. We also show that the equal error rate increases to 10% if the attackers see the users performing their gestures. This shows the limitation of gesture-based authentication and highlights the need for visual concealment.
暂无评论