Dynamic videos are viewed fundamentally different from static images. Besides spatial features, motion feature also plays an important role as a temporal factor. Most existing video saliency models usually employ opti...
详细信息
ISBN:
(纸本)9781467372596
Dynamic videos are viewed fundamentally different from static images. Besides spatial features, motion feature also plays an important role as a temporal factor. Most existing video saliency models usually employ optical flow to represent the motion feature. However, optical flow often suffers from the discontinuity problem. And we also notice that human fixations in one single video frame are much sparser than that in an identical still picture. However, many spatial saliency models take each video frame as static image independently. In this paper, we predict the dynamic visual saliency by fusing spatial and temporal features. In order to construct the temporal relationships among a set of successive frames, we introduce a smoothness operator in optical flow field to obtain more accurate motion feature. Then, considering the sparse property of video saliency, we adapt the weights of the regions surrounding to the saliency gravity center in the final maps. The experiments show that our model is more consistent with humans eye-tracking benchmarks than the state-of-the-art models.
Since the majority of the available steganographic schemes in OOXML format documents suffered the disadvantages of unsatisfactory anti-detection capability and security level, a characteristic-preserving steganographi...
详细信息
The incomplete data is universal in many real-life applications due to data integration, the limitation of devices, etc. In this demonstration, we present SI2P, a restaurant recommendation System with Preference queri...
详细信息
No reference video quality assessment (NR-VQA) measures distorted videos quantitatively without the reference of original high quality videos. Conventional NR-VQA methods are generally designed for specific types of d...
详细信息
Hadoop MapReduce has been proven an effective computing model to deal with bigdata for the last few years. However, one technical challenge facing this framework is how to predict the execution time of an individual ...
详细信息
Erasure coding has been increasingly used by distributed storage systems to maintain fault tolerance with low storage redundancy. However, how to enhance the performance of degraded reads in erasure-coded storage has ...
详细信息
ISBN:
(纸本)9781509035144
Erasure coding has been increasingly used by distributed storage systems to maintain fault tolerance with low storage redundancy. However, how to enhance the performance of degraded reads in erasure-coded storage has been a critical issue. We revisit this problem from two different perspectives that are neglected by existing studies: data placement and encoding rules. To this end, we propose an encoding-aware data placement (EDP) approach that aims to reduce the number of I/Os in degraded reads during a single failure for general XOR-based erasure codes. EDP carefully places sequential data based on the encoding rules of the given erasure code. Trace-driven evaluation results show that compared to two baseline data placement methods, EDP reduces up to 37.4% of read data on the most loaded disk and shortens up to 15.4% of read time.
In this paper, we propose a novel model for unsupervised segmentation of viewer's attention object from natural images based on localizing region-based active con-tour (LRAC). Firstly, we proposed the saliency det...
详细信息
In the current social background,Existing facilities and tools already can not meet the needs of bigdata in expanding and analysis ***'s data storage and analysis work is achieved under cloud conditions and Hadoo...
详细信息
ISBN:
(纸本)9789462520677
In the current social background,Existing facilities and tools already can not meet the needs of bigdata in expanding and analysis ***'s data storage and analysis work is achieved under cloud conditions and Hadoop were set *** the conditions for cloud computing,cloud computing applications who have remote data files were not authorized to read its contents,which results in unauthorized manipulation,and it will produce a lot of security risks for large *** this paper,according to the cloud of different modes,Hadoop different stages of the operation,subject to the threat of non- confidence and security to steal bigdata generated to analyze a variety of privacy,with threat model as an example,it explores ways to address security threats.
In this paper, a Price learning based Load Distribution Strategy (PLDS) is proposed at first. In PLDS model, Smart Power Service, Utility Company and History Load Curves are included, and by considering both the avera...
详细信息
Human saccade is a dynamic process of information pursuit. There are many methods using either global context or local context cues to model human saccadic scan-paths. In contrast to them, this paper introduces a mode...
详细信息
Human saccade is a dynamic process of information pursuit. There are many methods using either global context or local context cues to model human saccadic scan-paths. In contrast to them, this paper introduces a model for gaze movement control using both global and local cues. To test the performance of this model, an experiment is done to collect human eye movement data by using an SMI iVIEW X Hi-Speed eye tracker with a sampling rate of 1250 Hz. The experiment used a two-by-four mixed design with the location of the targets and the four initial positions. We compare the saccadic scan-paths generated by the proposed model against human eye movement data on a face benchmark dataset. Experimental results demonstrate that the simulated scan-paths by the proposed model are similar to human saccades in term of the fixation order, Hausdorff distance, and prediction accuracy for both static fixation locations and dynamic scan-paths.
暂无评论