Due to the advantages of scale invariant feature transform (SIFT) feature points on the invariant to image scale, brightness, rotation, occlusion, noise and so on, this paper proposes a Particle Tracking Velocimetry (...
详细信息
The study on signed social networks community detection has been paid more and more attention. Research shows that two-phase signed social networks community detection algorithm can not correctly divide the network. T...
详细信息
Based on a new feature that macro network structure and micro game have mutual inuence on the formation of the community, to mining communities in signed network, a novel algorithm SNCGHC is proposed. Firstly, accordi...
详细信息
In this letter, a periodic autocorrelation signal is presented, which is the ternary sequence pair with two-level autocorrelation. The methods of constructing ternary sequence pairs based on binary sequence pairs and ...
详细信息
The existing recommendation algorithms have lower robustness against shilling attacks. With this in mind, in this paper we propose a robust recommendation algorithm based on the identification of suspicious users and ...
详细信息
In the paper, we present a new method for constructing a class of quaternary sequence pairs with even period 2N from the known binary sequence pairs with odd period N by using the reverse Gray mapping and interleaving...
详细信息
Software’s control flow graph can be treated as a complex software network, and a tiny fraction of key function nodes has considerable influence on the stability, reliability and robustness of the network. Identifyin...
详细信息
Occlusion avoidance is a more challenging problem in visual field. An occlusion avoidance approach based on depth image of visual object is proposed in this paper. Firstly, the occlusion detection is implemented for t...
详细信息
We present a new GPU scheme for real-time simulation in large-scale water environments with physics-based object interaction. To improve the simulation efficiency, we divide surface waves into ambient waves and intera...
详细信息
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining...
详细信息
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining the suspicious fault nodes from the passing and failing execution graphs. Representing each execution of a program as a graph, the graphs are divided into the passing and failing sets. By extracting the most representative passing and failing graphs based on these sets, the discriminative sub-graph is mined between the two representative graphs. First, Sig BB searches the max common graph, and then gets the opposite nodes set. The discriminative sub-graph is obtained by organizing and extending the set finally. Since the detected code scale is associated with the sorting of suspicious nodes, a suspicious metric strategy is also designed to sort the nodes in the discriminative sub-graph. Experimental results indicate that our method is both effective and efficient for software fault localization.
暂无评论