The gradient vector flow (GVF) is an effective external force for active contours, but it's smoothness constraint doesn't take any image structure into account and the resulting diffusion equation is isotropic...
详细信息
Ground Test Platform for Space Teleoperation (GTPST) is a complicated distributed system consisted of multiple subsystems, and controlling it properly under large transmission delay is a huge challenge. Multi-agent Sy...
详细信息
This paper presents an energy-efficient scheduling algorithm with accrual utility in battery-powered embedded systems. We propose our Two-Step Energy-Efficient Algorithm (TSEEA), which comprises two parts: a static al...
详细信息
ISBN:
(纸本)9780791802977
This paper presents an energy-efficient scheduling algorithm with accrual utility in battery-powered embedded systems. We propose our Two-Step Energy-Efficient Algorithm (TSEEA), which comprises two parts: a static algorithm, which runs offline and achieves the static execution frequencies of all tasks under conservative conditions;and a dynamic one, which strives to reclaim slack time and effectively tunes execution frequency of candidate task in a timely manner. Compared with other algorithms, our algorithm can fully exploit a supply of limited energy to yield more utility. The experiments validate our analytical results and demonstrate that the proposed algorithm outperforms other existing algorithms with respect to utility.
Recent studies have found that adoption of structure similarity index (SSIM) was successful in reflecting human visual characteristic better compared with traditional PSNR metrics. However this method shows some defec...
详细信息
This is the 8th year that IR group of Tsinghua University (THUIR) participates in TREC. This year we focus on Web track, which contains two tasks, namely ad hoc and diversity. On ad hoc task, we improved the efficienc...
详细信息
This is the 8th year that IR group of Tsinghua University (THUIR) participates in TREC. This year we focus on Web track, which contains two tasks, namely ad hoc and diversity. On ad hoc task, we improved the efficiency of our distributed retrieval system TMiner to handle terabytes of Web data. Then three studies have been done, namely page quality estimation, ranking feature analysis, and model comparison. On diversity task, we proposed several new approaches on searching strategy, user intention detection, and duplication elimination. To mine user's intention, we proposed and compared two different strategies, namely "searching + content-based diversity' which is a kind of result clustering, and "user based diverse intention prediction + searching' which is in the branch of query expansion.
The resource limitation of mobile devices causes the problem that the existing image processing software based on the centralized computing mode had difficulty running in mobile devices. A solution is given in the pap...
详细信息
We present a novel method of Object-Oriented test case generation based on UML state diagrams and lab.l Transition system (LTS). The procedure is based on model-based testing techniques with test cases generated from ...
详细信息
By researching Voronoi diagram, parallel algorithm, and divide-and-conquer method, we present a special data structure(change doubly-connected list little) for Voronoi diagram generation in parallel. In this paper we ...
详细信息
A new method for constructing phylogenetic trees from a given set of objects (proteins, species , etc.) is presented. The method bisects the set of gene sequences so that the sequences within one subset have most simi...
详细信息
In this paper, an incremental outlier detection technique capable of dealing with a large amount of data is presented and evaluated in the context of intrusion detection. The proposed method is based on the LOcal Corr...
详细信息
ISBN:
(纸本)9781605581668
In this paper, an incremental outlier detection technique capable of dealing with a large amount of data is presented and evaluated in the context of intrusion detection. The proposed method is based on the LOcal Correlation Integral (LOCI for short). The detection technique consists of two parts. The first part named insertion receives the sequence of input point and updates Multi-granularity DEviation Factor (MDEF) of the point at intervals. The second part named deletion deletes one or a batch of points. This technique is able to process streaming data in a single scan. Moreover, the number of updates in the incremental LOCI algorithm per insertion/deletion of a single data record does not depend on the total number of data records. Experimental results with real life data sets show that the technique is capable of dealing with data streams, successfully detecting outlier. Copyright 2009 ACM.
暂无评论