Opponent modeling is an essential approach for building competitive computer agents in imperfect information games. This paper presents a novel approach to develop opp onent modeling techniques. The approach applies n...
详细信息
A distributed signature scheme allows participants in a qualified set to jointly generate a signature which cannot be forged even when all the unqualified participants collude together. In this paper, we propose an ef...
详细信息
In order to reduce the complexity of traditional multithreaded parallel programming,this paper explores a new task-based parallel programming using the *** Task Parallel Library(TPL).Firstly,this paper proposes a cu...
详细信息
In order to reduce the complexity of traditional multithreaded parallel programming,this paper explores a new task-based parallel programming using the *** Task Parallel Library(TPL).Firstly,this paper proposes a custom data partitioning optimization method to achieve an efficient data parallelism,and applies it to the matrix *** result of the application supports the custom data partitioning optimization *** we develop a task parallel application:Image Blender,and this application explains the efficiency and pitfall aspects associated with task ***,the paper analyzes the performance of our *** results show that TPL can dramatically alleviate programmer burden and boost the performance of programs with its taskbased parallel programming mechanism.
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper ...
详细信息
ISBN:
(纸本)9781479932801
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper proposes a custom data partitioning optimization method to achieve an efficient data parallelism, and applies it to the matrix multiplication. The result of the application supports the custom data partitioning optimization method. Then we develop a task parallel application: Image Blender, and this application explains the efficiency and pitfall aspects associated with task parallelism. Finally, the paper analyzes the performance of our applications. Experiments results show that TPL can dramatically alleviate programmer burden and boost the performance of programs with its task-based parallel programming mechanism.
Timely and cost-efficient multi-hop data delivery among vehicles is essential for vehicular ad-hoc networks (VANETs), and various routing protocols are envisioned for infrastructure-less vehicle-to-vehicle (V2V) c...
详细信息
Timely and cost-efficient multi-hop data delivery among vehicles is essential for vehicular ad-hoc networks (VANETs), and various routing protocols are envisioned for infrastructure-less vehicle-to-vehicle (V2V) communications. Generally, when a packet (or a duplicate) is delivered out of the routing path, it will be dropped. However, we observe that these packets (or duplicates) may also be delivered much faster than the packets delivered along the original routing path. In this paper, we propose a novel tree based routing scheme (TBRS) for ultilizing the dropped packets in VANETs. In TBRS, the packet is delivered along a routing tree with the destination as its root. And when the packet is delivered out its routing tree, it won't be dropt immediately and will be delivered for a while if it can arrive at another branch of the tree. We conduct the extensive simulations to evaluate the performance of TBRS based on the road map of a real city collected from Google Earth. The simulation results show that TBRS can outperform the existing protocols, especially when the network resources are limited.
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It ...
详细信息
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It is a novel approach to mitigate the (inherent) key escrow problem in identity-based cryptosystems. In this work, the concept of accountable authority to attribute-based encryption (ABE) setting is generalized for the first time, and then a construction is given. The scheme non-trivially integrates an A-IBE scheme proposed by Libert et al. with an ABE scheme. In our construction, a user will be identified by a pair ( id, o~), where id denotes the user' s identity and ω denotes the set of attributes associated to the user. In addition, our construction is shown to be secure under some reasonable assumptions.
We develop a new video-based motion analysis algorithn to determine whether two persons have any interaction in their meet- ing. The interaction between two persons can be very general, such as shaking hands, exchangi...
详细信息
We develop a new video-based motion analysis algorithn to determine whether two persons have any interaction in their meet- ing. The interaction between two persons can be very general, such as shaking hands, exchanging objects, and so on. To make the motio~ analysis robust to image noise, we segment each video flame into a set of superpixels and then derive a motion feature and a motion pattern for each superpixel by averaging the optical flow within the superpixe Specifically, we use the lattice cut to construct the superpixels, which are spatially and temporally consistent across frames. Based on the motion feature and the motion pattern of the superpixels, we develop an algorithm to divide an input video sequence into three consecutive periods: 1) two persons walking toward each other, 2) two persons meeting each other, and 3) two persons walking away fi'om each other. The experiment show that the proposed algorithm can accurately dis- tinguish the videos with and without human interactions.
Introduction: The physical access media communication traverses is increasing in diversity. Users now access data and services from wired computers, wireless laptops, PDAs, cell phones, and any number of embedded devi...
暂无评论