Cloud computing will be a main information infrastructure in the future;it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for clou...
详细信息
Cloud computing will be a main information infrastructure in the future;it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing.
Event anaphora resolution plays a critical role in discourse analysis. This paper proposes a tree kernel- based framework for event pronoun resolution. In particular, a new tree expansion scheme is introduced to autom...
详细信息
ISBN:
(纸本)9781577355120
Event anaphora resolution plays a critical role in discourse analysis. This paper proposes a tree kernel- based framework for event pronoun resolution. In particular, a new tree expansion scheme is introduced to automatically determine a proper parse tree structure for event pronoun resolution by considering various kinds of competitive information related with the anaphor and the antecedent candidate. Evaluation on the OntoNotes English corpus shows the appropriateness of the tree kernel-based framework and the effectiveness of competitive information for event pronoun resolution.
A rule-based approach for Chinese zero anaphor detection is proposed. Given a parse tree, the smallest IP sub-tree covering the current predicate is captured. Based on this IP sub-tree, some rules are proposed for det...
详细信息
Both preference logics and preference representation in logic programming are concerned with reasoning about preferences on combinatorial domains, yet little research has been published using preference axioms in logi...
详细信息
Fighting shots are the highlights of action movies and an effective approach to discriminating fighting shots is very useful for many applications, such as movie trailer construction, movie content filtering, and movi...
详细信息
Fighting shots are the highlights of action movies and an effective approach to discriminating fighting shots is very useful for many applications, such as movie trailer construction, movie content filtering, and movie content retrieval. In this paper, we present a novel method for this task. Our approach first extracts the reliable motion information of local invariant features through a robust keypoint tracking computation; then foreground keypoints are distinguished from background keypoints by a sophisticated voting process; further, the parameters of the camera motion model is computed based on the motion information of background keypoints, and this model is then used as a reference to compute the actual motion of foreground keypoints; finally, the corresponding feature vectors are extracted to characterizing the motions of foreground keypoints, and a support vector machine (SVM) classifier is trained based on the extracted feature vectors to discriminate fighting shots. Experimental results on representative action movies show our approach is very effective.
General object recognition and image understanding is recognized as a dramatic goal for computer vision and multimedia retrieval. In spite of the great efforts devoted in the last two decades, it still remains an open...
详细信息
General object recognition and image understanding is recognized as a dramatic goal for computer vision and multimedia retrieval. In spite of the great efforts devoted in the last two decades, it still remains an open problem. In this paper, we propose a selective attention-driven model for general image understanding, named GORIUM (general object recognition and image understanding model). The key idea of our model is to discover recurring visual objects by selective attention modeling and pairwise local invariant features matching on a large image set in an unsupervised manner. Towards this end, it can be formulated as a four-layer bottom-up model, i.e., salient region detection, object segmentation, automatic object discovering and visual dictionary construction. By exploiting multi-task learning methods to model visual saliency simultaneously with the bottom-up and top-down factors, the lowest layer can effectively detect salient objects in an image. The second layer exploits a simple yet effective learning approach to generate two complementary maps from several raw saliency maps, which then can be utilized to segment the salient objects precisely from a complex scene. For the third layer, we have also implemented an unsupervised approach to automatically discover general objects from large image set by pairwise matching with local invariant features. Afterwards, visual dictionary construction can be implemented by using many state-of-the-art algorithms and tools available nowadays.
This paper addresses color filter array(CFA) color reproduction problem where the aim is to utilize an image captured by the CFA to produce an image with full color ***,conventional subband synthesis based color rep...
详细信息
This paper addresses color filter array(CFA) color reproduction problem where the aim is to utilize an image captured by the CFA to produce an image with full color ***,conventional subband synthesis based color reproduction techniques do not consider the noise during image acquisition and assume that the CFA data are *** tackle the noisy CFA data,a novel approach is proposed by inserting a subband denoising scheme into the conventional subband synthesis ***,conventional subband synthesis based techniques exploit the decimated wavelet transform that is not shift-invariant and could result in ringing artifacts in the *** alleviate these artifacts,the directional cycle-spinning(DCS) technique is ***,a new cycle-spinning pattern is proposed according to the sampling pattern of the Bayer CFA *** experiments are conducted to demonstrate that the proposed approach outperforms several approaches.
We propose a new interpretation for a certain kind of ASO preference rules to handling prioritized symptoms. Our interpretation is based on the idea of dependence based priority propagation. Then, we present a fixpoin...
详细信息
A key technique for protein analysis is the geometric alignment of two-dimensional polyacrylamide gel electrophoresis (2-D PAGE), i.e. 2-D PAGE image registration. In this study, according to the characteristics of 2-...
详细信息
In this paper, we present a pose based approach for locating and recognizing human actions in videos. In our method, human poses are detected and represented based on deformable part model. To our knowledge, this is t...
详细信息
暂无评论