Traditional DRAM-based memory solutions face challenges, including high energy consumption and limited scalab.lity. Non-Volatile Memory (NVM) offers low energy consumption and high scalab.lity. However, security chall...
详细信息
Dear editor,Depicting superior punctuality and originality,Weibo has become increasingly critical and influential in China for online information acquisition and sharing. However, very few research has studied Weibo t...
详细信息
Dear editor,Depicting superior punctuality and originality,Weibo has become increasingly critical and influential in China for online information acquisition and sharing. However, very few research has studied Weibo to investigate event summarizing even though most of the published Weibos are event-driven. Besides, we observe that the existing methods are unsuitable for process-
Neural Radiance Fields (NeRF) have been gaining attention as a significant form of 3D content representation. With the proliferation of NeRF-based creations, the need for copyright protection has emerged as a critical...
详细信息
Neural Radiance Fields (NeRF) have been gaining attention as a significant form of 3D content representation. With the proliferation of NeRF-based creations, the need for copyright protection has emerged as a critical issue. Although some approaches have been proposed to embed digital watermarks into NeRF, they often neglect essential model-level considerations and incur substantial time overheads, resulting in reduced imperceptibility and robustness, along with user inconvenience. In this paper, we extend the previous criteria for image watermarking to the model level and propose NeRF Signature, a novel watermarking method for NeRF. We employ a Codebook-aided Signature Embedding (CSE) that does not alter the model structure, thereby maintaining imperceptibility and enhancing robustness at the model level. Furthermore, after optimization, any desired signatures can be embedded through the CSE, and no fine-tuning is required when NeRF owners want to use new binary signatures. Then, we introduce a joint pose-patch encryption watermarking strategy to hide signatures into patches rendered from a specific viewpoint for higher robustness. In addition, we explore a Complexity-Aware key Selection (CAKS) scheme to embed signatures in high visual complexity patches to enhance imperceptibility. The experimental results demonstrate that our method outperforms other baseline methods in terms of imperceptibility and robustness.
Switching units and networks have been analyzed as extensible fabrics,mostly in terms of their scheduling *** traditional literature on switching extensibility has provided complexity theory only relating to the total...
详细信息
Switching units and networks have been analyzed as extensible fabrics,mostly in terms of their scheduling *** traditional literature on switching extensibility has provided complexity theory only relating to the total numbers of inputs(or outputs)and exchange *** paper analyzes switching extensibility in terms of not only the scheduling algorithm and also the fabric *** is found that determining extensibility from soft complexity related to the number of inputs(or outputs)of the scheduling algorithm and the fabric extensibility in previous studies without quantization is a flawed conception.A method is thus proposed to express the spatial extensibility of a switching unit or network in terms of the connections of a switching resource and *** method calculates parameter ES(the efciency of switching)of an m×n switching unit and obtains two functions of the switching unit to describe spatial extensibility along with the number of unilateral inputs or *** is found that the range of ES is(0,1]and three types of switching unit and two types of crosspoint networks have ES=*** is calculated for banyan,Clos,parallel packet,fully interconnected and recirculation switching *** ES value for the banyan switching network is larger than that for other networks,and switching networks are classified into three types that have absolute/linear/denied spatial extensibility according to the limES *** is demonstrated that a switching network has the largest ES value when it contains only the five types of switching unit for which ES=***,a group-switching-first self-routing banyan switching network with lower blocking probability and time delay is deduced,and the ES method is contrasted with two other methods of evaluating spatial extensibility in terms of their mathematical expressions and intuitive graphics,for the five types of switching network listed above.
A vulnerability prediction and risk assessment process for the Xen hypervisor that predicts the number of vulnerabilities and levels of risk a specific software version provides is presented. 89 hypervisor is a key co...
详细信息
This paper presents an efficient hardware prototype for network coding (NC). First, a packet synchronization mechanism is introduced to settle the problem of packet arriving mismatch between different incoming channel...
详细信息
ISBN:
(纸本)9781849195478
This paper presents an efficient hardware prototype for network coding (NC). First, a packet synchronization mechanism is introduced to settle the problem of packet arriving mismatch between different incoming channels. Then a high-speed lookup-table-based circuit is designed to perform dot product over Galois Field, which forms the basic calculation unit of NC operation. Taking the speed advantage of FPGA hardware, this prototype is able to perform network coding operations within several hundred nanoseconds. Thus further studies and emulations on NC are able to be carried out upon this platform in the real network scenario.
Query-oriented relevance, information richness and novelty are important requirements in query-focused summarization, which, to a considerable extent, determine the summary quality. Previous work either rarely took in...
详细信息
Semi-supervised clustering ensemble has emerged as an important elab.ration of classical clustering problem that improves quality and robustness in clustering by combining the results of different clustering component...
详细信息
The acquiring of sentence similarity has become a crucial step in graph-based multi-document summarization algorithms which have been intensively studied during the past decade. Previous algorithms generally considere...
详细信息
The graph-based ranking models have been widely used for multi-document summarization recently. By utilizing the correlations between sentences, the salient sentences can be extracted according to the ranking scores. ...
详细信息
暂无评论