In this paper we propose a novel edge-based, fast and effective stereo matching method. If utilizes various geometrical and local area constraints as well as structural information among edge segments to perform a con...
详细信息
In this paper we propose a novel edge-based, fast and effective stereo matching method. If utilizes various geometrical and local area constraints as well as structural information among edge segments to perform a constraint-directed matching. By employing a heuristic lab.lling technique, the combinatorial search for isomorphic graphs is greatly reduced in the matching process. The implementation and experimental results are presented to show the efficacy of the proposed method.
This paper presents and implements an approach to parallel ACO algorithms. The principal idea is to make multiple ant colonies share and utilize only one pheromone matrix. We call it SHOP (SHaring One Pheromone matrix...
详细信息
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the und...
详细信息
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the und...
详细信息
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited Traditional methods of database access control places great depen...
详细信息
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin...
详细信息
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid ...
详细信息
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
暂无评论