Vision Transformers (ViTs) have become one of the most commonly used backbones for vision tasks. Despite their remarkable performance, they often suffer significant accuracy drops when quantized for practical deployme...
详细信息
To improve the accuracy of paper metadata extraction, a paper metadata extraction approach based on meta-learning is presented. Firstly, we propose a construction method of base-classifiers, which combines the Support...
详细信息
virtual reality(VR)offers an artificial,computer generated simulation of a real life *** originated in the 1960 s and has evolved to provide increasing immersion,interactivity,imagination,and *** deep learning systems...
详细信息
virtual reality(VR)offers an artificial,computer generated simulation of a real life *** originated in the 1960 s and has evolved to provide increasing immersion,interactivity,imagination,and *** deep learning systems are able to represent and compose information at various levels in a deep hierarchical fashion,they can build very powerful models which leverage large quantities of visual media *** of VR methods and applications has been significantly boosted by the recent developments in deep learning *** content creation and exploration relates to image and video analysis,synthesis and editing,so deep learning methods such as fully convolutional networks and general adversarial networks are widely employed,designed specifically to handle panoramic images and video and virtual 3 D *** article surveys recent research that uses such deep learning methods for VR content creation and *** considers the problems involved,and discusses possible future directions in this active and emerging research area.
Intrinsic image decomposition is an important and long-standing computer vision *** an input image,recovering the physical scene properties is *** physically motivated priors have been used to restrict the solution sp...
详细信息
Intrinsic image decomposition is an important and long-standing computer vision *** an input image,recovering the physical scene properties is *** physically motivated priors have been used to restrict the solution space of the optimization problem for intrinsic image *** work takes advantage of deep learning,and shows that it can solve this challenging computer vision problem with high *** focus lies in the feature encoding phase to extract discriminative features for different intrinsic layers from an input *** achieve this goal,we explore the distinctive characteristics of different intrinsic components in the high-dimensional feature embedding *** define feature distribution divergence to efficiently separate the feature vectors of different intrinsic *** feature distributions are also constrained to fit the real ones through a feature distribution *** addition,a data refinement approach is provided to remove data inconsistency from the Sintel dataset,making it more suitable for intrinsic image *** method is also extended to intrinsic video decomposition based on pixel-wise correspondences between adjacent *** results indicate that our proposed network structure can outperform the existing state-of-the-art.
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining...
详细信息
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining the suspicious fault nodes from the passing and failing execution graphs. Representing each execution of a program as a graph, the graphs are divided into the passing and failing sets. By extracting the most representative passing and failing graphs based on these sets, the discriminative sub-graph is mined between the two representative graphs. First, Sig BB searches the max common graph, and then gets the opposite nodes set. The discriminative sub-graph is obtained by organizing and extending the set finally. Since the detected code scale is associated with the sorting of suspicious nodes, a suspicious metric strategy is also designed to sort the nodes in the discriminative sub-graph. Experimental results indicate that our method is both effective and efficient for software fault localization.
Analyzing structure of a software system is not sufficient for understanding its functionality. Certain characteristics of software are often hidden in its structure and can only be discovered when the various executi...
详细信息
Medical image segmentation has an important application value in the modern medical field, it can help doctors accurately locate and analyze the tissue structure, lesion areas, and organ boundaries in the image, which...
详细信息
Friend recommendation is popular in social site to help people make new friends and expand their social networks. However, the conventional friend recommendation method is low accuracy for the sparsity of data and col...
详细信息
To solve edge confusion problems in the geo-related graph visualization, here we present an edge bundling algorithm based on the road network information. First, the improved Dijkstra shortest path algorithm is employ...
详细信息
We present a novel system that can transfer facial expressions from an actor to a non-human-like character. Compared with a lot of previous studies, our system requires no special light conditions or facial markers fo...
详细信息
暂无评论