This paper presents a saliency based bag-of-phrases (Saliency-BoP for short) method for image retrieval. It combines saliency detection with visual phrase construction to extract bag-of-phrase features. To achieve thi...
详细信息
Independent spanning trees (ISTs for short) in networks have applications such as reliable communication protocols, the multi-node broadcasting, one-to-all broadcasting, reliable broadcasting, and secure message distr...
详细信息
Independent spanning trees (ISTs for short) in networks have applications such as reliable communication protocols, the multi-node broadcasting, one-to-all broadcasting, reliable broadcasting, and secure message distribution. However, it is an open problem whether there are n ISTs rooted at any node in any n connected network with n 5. In this paper, we consider the construction of ISTs in a family of hypercube variants, called conditional BC networks. A recursive algorithm based on two common rules is proposed to construct n ISTs rooted at any node in any n -dimensional conditional BC network n X . We also show that our constructive method is adaptive to not only the existing hypercube variants, but also some other ones.
When more and more processor cores are integrated onto a single chip, the computing ability has been improved dramatically. And the power consumed by the cores is also increased. More tasks can run in parallel for hig...
详细信息
ISBN:
(纸本)9781467371902
When more and more processor cores are integrated onto a single chip, the computing ability has been improved dramatically. And the power consumed by the cores is also increased. More tasks can run in parallel for higher performance. It is a new challenge on how to map the tasks to the cores. The suitable task mapping method can enhance the parallelism of the system. However, it is still a problem to reduce the power-consumption. In this paper, a novel method is proposed to map the tasks to the cores efficiently with lower power consumption. The case study and related experimental results show that our method can have better performance and reduced power consumption.
This paper proposes a new program on the integrity of the data to the probabilistic methods when the number of documents inserted the pseudo-tuple becomes large. In this program, pseudo-tuple inserted in accordance wi...
详细信息
Mining frequent itemsets from traditional database is an important research topic in data mining and researchers achieved tremendous progress in this field. However, with the emergence of new applications, the traditi...
详细信息
This paper studies the characteristics of cloud computing environment, based on the traditional access control management technology, proposes a reference model for access control management in the cloud computing, de...
详细信息
Many recent state-of-the-art image retrieval approaches are based on Bag-of-Visual-Words model and represent an image with a set of visual words by quantizing local SIFT(scale invariant feature transform) features. ...
详细信息
Many recent state-of-the-art image retrieval approaches are based on Bag-of-Visual-Words model and represent an image with a set of visual words by quantizing local SIFT(scale invariant feature transform) features. Feature quantization reduces the discriminative power of local features and unavoidably causes many false local matches between images, which degrades the retrieval accuracy. To filter those false matches, geometric context among visual words has been popularly explored for the verification of geometric consistency. However, existing studies with global or local geometric verification are either computationally expensive or achieve limited accuracy. To address this issue, in this paper, we focus on partialduplicate Web image retrieval, and propose a scheme to encode the spatial context for visual matching verification. An efficient affine enhancement scheme is proposed to refine the verification results. Experiments on partial-duplicate Web image search, using a database of one million images, demonstrate the effectiveness and efficiency of the proposed *** on a 10-million image database further reveals the scalability of our approach.
According to the problem that conventional laminated paper counting algorithms have some unavoidable shortcomings such as high dependence on the quality of laminated paper and noise sensitivity, we propose a laminated...
详细信息
In order to recognize the object of the external world, brain need to integrate the information of different cortical areas, then form a complete world. And binding problem study on a process to percept a complete obj...
详细信息
Digital Rights Management (DRM) is a type of access-control technology that is used by diverse content providers to restrict the use of digital content. Enterprise Digital Rights Management (E-DRM) is an application o...
详细信息
暂无评论