Active shape model (ASM) is an image searching method based on statistical model, which is widely used to extract features. The classical ASM model includes the shape model and the local profile model. The main merit ...
详细信息
This paper studies the optimal visibility coverage for autonomous robots in complex 3D environments. The perception sensor equipped on an inspection robot usually has a pyramid-shaped visible range with limited distan...
详细信息
High speed networks have characteristics of high bandwidth, long queuing delay, and high burstiness which make it difficult to address issues such as fairness, low queuing delay and high link utilization. Current high...
详细信息
This paper introduces an objective method for the perceptual evaluation of high-quality, multichannel audio codecs. In the proposed method, the five monaural Model Output Variables (MOVs) of ITU-RBS.1387-1 are combine...
详细信息
This paper introduces an objective method for the perceptual evaluation of high-quality, multichannel audio codecs. In the proposed method, the five monaural Model Output Variables (MOVs) of ITU-RBS.1387-1 are combined with four novelMOVs that predict quality degrades in spatial attributes. The proposed method was trained and verified on a listening-test database created by ITU-R WP6C using high-quality audio codecs. The proposed method shows an encouraging performance in the prediction of perceived audio quality.
In this work, we discuss a recently proposed approach for supervised dimensionality reduction, the Supervised Distance Preserving Projection and, we investigate its applicability to monitoring material's propertie...
详细信息
We construct a publicly verifiable protocol for proving computational work based on collision-resistant hash functions and a new plausible complexity assumption regarding the existence of "inherently sequential&q...
详细信息
ISBN:
(纸本)9781450318594
We construct a publicly verifiable protocol for proving computational work based on collision-resistant hash functions and a new plausible complexity assumption regarding the existence of "inherently sequential" hash functions. Our protocol is based on a novel construction of time-lock puzzles. Given a sampled "puzzle" P →$ Dn, where n is the security parameter and Dn is the distribution of the puzzles, a corresponding "solution" can be generated using N evaluations of the sequential hash function, where N > n is another parameter, while any feasible adversarial strategy for generating valid solutions must take at least as much time as Ω(N) serial evaluations of the hash function after receiving P. Thus, valid solutions constitute a "proof" that Ω(N) parallel time elapsed since p was received. Solutions can be publicly and efficiently verified in time poly(n) · polylog(N). Applications of these "time-lock puzzles" include noninteractive timestamping of documents (where the distribution over the possible documents corresponds to the puzzle distribution Dn) and universally verifiable CPU benchmarks. Our construction is secure in the standard model under complexity assumptions (collision-resistant hash functions and inherently sequential hash functions), and makes black-box use of the underlying primitives. Consequently, the corresponding construction in the random oracle model is secure unconditionally. Moreover, as it is a public-coin protocol, it can be made non-interactive in the random oracle model using the Fiat-Shamir Heuristic. Our construction makes a novel use of "depth-robust" directed acyclic graphs - ones whose depth remains large even after removing a constant fraction of vertices - which were previously studied for the purpose of complexity lower-bounds. The construction bypasses a recent lower-bound of Mahmoody, Moran, and Vadhan (CRYPTO '11) for time-lock puzzles in the random oracle model, which showed that it is impossible to have time-lock puzzles l
We develop a method for the efficient design of nanoscale metal-dielectric-metal plasmonic waveguide devices, based on the space-mapping algorithm and transmission line theory models. The method requires full-wave sim...
详细信息
The vanishing ideal of a set of points, S ⊂ n, is the set of all polynomials that attain the value of zero on all the points in S. Such ideals can be compactly represented using a small set of polynomials known as gen...
详细信息
ISBN:
(纸本)9781629933061
The vanishing ideal of a set of points, S ⊂ n, is the set of all polynomials that attain the value of zero on all the points in S. Such ideals can be compactly represented using a small set of polynomials known as generators of the ideal. Here we describe and analyze an efficient procedure that constructs a set of generators of a vanishing ideal. Our procedure is numerically stable, and can be used to find approximately vanishing polynomials. The resulting polynomials capture nonlinear structure in data, and can for example be used within supervised learning. Empirical comparison with kernel methods show that our method constructs more compact classifiers with comparable accuracy. Copyright 2013 by the author(s).
Distraction while driving is a serious problem that can have many catastrophic consequences. Developing a countermeasure to detect the drivers' distraction is imperative. This study measured Electroencephalography...
详细信息
We give a new construction of pseudorandom generators from any one-way function. The construction achieves better parameters and is simpler than that given in the seminal work of Hastad, Impagliazzo, Levin, and Luby [...
详细信息
暂无评论