Entity Linking (EL) aims to map mentions in a text to corresponding entities in a knowledge base. Existing EL methods usually rely on sufficient labeled data to achieve the best performance. However, the massive inves...
详细信息
We propose a new scheduling policy for performance asymmetric multiprocessors that have identical instruction sets but different processing speeds. The difference between it and the original Pfair scheduling is that w...
详细信息
ISBN:
(数字)9798350340266
ISBN:
(纸本)9798350340273
We propose a new scheduling policy for performance asymmetric multiprocessors that have identical instruction sets but different processing speeds. The difference between it and the original Pfair scheduling is that when selecting scheduling parameters such as the pseudo deadline of the subtask and selecting the processor when running the highest priority subtask, it can be aware of the performance asymmetry of the underlying processor. In addition, we also propose a sufficient schedulability test for Pfair scheduling on performance asymmetric multiprocessors.
Graph Neural Networks (GNNs) have become essential in interpreting relational data across various domains, yet, they often struggle to generalize to unseen graph data that differs markedly from training instances. In ...
With the development of Intelligent Transportation Systems (ITS), real-time processing and privacy protection for traffic data become particularly important. In this research, we explore how to process traffic data ef...
详细信息
ISBN:
(数字)9798350307597
ISBN:
(纸本)9798350307603
With the development of Intelligent Transportation Systems (ITS), real-time processing and privacy protection for traffic data become particularly important. In this research, we explore how to process traffic data efficiently and securely in fog computing environments, especially in wireless in-vehicle networks. First, we propose a homomorphic encryption-based strategy that performs computation on ciphertexts, eliminating the need for frequent decryption and thus achieving higher data processing efficiency. Then, we provide an in-depth discussion on data integrity and real-time performance, and propose a novel data validation method to ensure data integrity and real-time updates in fog computing environments. In addition, we designed a series of simulation experiments using virtual data to verify the effectiveness of our approach. The experimental results show that our strategy not only greatly improves the data processing speed, but also effectively guarantees the privacy and integrity of the data. Overall, this study provides a new and efficient method for traffic data processing in fog computing environments, which is an important reference value for future traffic data processing.
Drug box recognition is an integral part of the pharmacy automation system (PAS), which checks for discrepancies between the drugs provided by the system and the doctor's prescription with the help of modern image...
详细信息
Semantic segmentation and semantic image synthesis are two representative tasks in visual perception and generation. While existing methods consider them as two distinct tasks, we propose a unified framework (SemFlow)...
ISBN:
(纸本)9798331314385
Semantic segmentation and semantic image synthesis are two representative tasks in visual perception and generation. While existing methods consider them as two distinct tasks, we propose a unified framework (SemFlow) and model them as a pair of reverse problems. Specifically, motivated by rectified flow theory, we train an ordinary differential equation (ODE) model to transport between the distributions of real images and semantic masks. As the training object is symmetric, samples belonging to the two distributions, images and semantic masks, can be effortlessly transferred reversibly. For semantic segmentation, our approach solves the contradiction between the randomness of diffusion outputs and the uniqueness of segmentation results. For image synthesis, we propose a finite perturbation approach to enhance the diversity of generated results without changing the semantic categories. Experiments show that our SemFlow achieves competitive results on semantic segmentation and semantic image synthesis tasks. We hope this simple framework will motivate people to rethink the unification of low-level and high-level vision.
The palmprint images contains a multitude of unique characteristics for human identity recognition, making it the most potential and influential research content in biometric projects and some palmprint recognition al...
详细信息
作者:
Wang, FeiyuZhou, Jian-TaoCollege of Computer Science
Inner Mongolia University Inner Mongolia Hohhot China Engineering Research Center of Ecological Big Data
Ministry of Education Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
Cloud storage services have been used by most businesses and individual users. However, data loss, service interruptions and cyber attacks often lead to cloud storage services not being provided properly, and these in...
Computing the weighted girth, which is the sum of weights of edges in the minimum weight cycle,is an important problem in network analysis. The problem for distributively computing girth in unweighted graphs has garne...
详细信息
Computing the weighted girth, which is the sum of weights of edges in the minimum weight cycle,is an important problem in network analysis. The problem for distributively computing girth in unweighted graphs has garnered lots of attention, but there are few studies in weighted graphs. In this paper, we propose a distributed randomized algorithm for computing the weighted girth in weighted graphs with integral edge weights in the range [1, nc], where n is the number of vertices and c is a constant. The algorithm is devised under the standard synchronous CON GE S T model, which limits each vertex can only transfer O(log n) bits information along each incident edge in a round. The upper bound of the algorithm is O(n log2n) rounds. We also prove the lower bound for computing the weighted girth is ?(D + n/log n) where D is the hop diameter of the weighted graph. This means our distributed algorithm is optimal within a factor of O(log3n).
In satellite communications, global navigation satellite systems(GNSS) and other important space activities, the value of total electron content (TEC) in the ionosphere directly affects the size of ionospheric delay. ...
详细信息
暂无评论