Many existing studies employ graph neural networks (GNNs) to aggregate information from neighboring nodes and learn node embeddings in a low-dimensional space, aiming to produce layouts that satisfy established aesthe...
详细信息
As Internet of Things (IoT) devices continue to proliferate and users' demands for low-latency and compute-intensive services grow, mobile edge computing (MEC) can effectively reduce task processing delay and ener...
详细信息
Background: Knowledge representation learning aims at mapping entity and relational data in knowledge graphs to a low-dimensional space in the form of vectors. The existing work has mainly focused on structured inform...
详细信息
Voronoi diagrams on triangulated surfaces based on the geodesic metric play a key role in many applications of computer *** methods of constructing such Voronoi diagrams generally depended on having an exact geodesic ...
详细信息
Voronoi diagrams on triangulated surfaces based on the geodesic metric play a key role in many applications of computer *** methods of constructing such Voronoi diagrams generally depended on having an exact geodesic ***,exact geodesic computation is time-consuming and has high memory usage,limiting wider application of geodesic Voronoi diagrams(GVDs).In order to overcome this issue,instead of using exact methods,we reformulate a graph method based on Steiner point insertion,as an effective way to obtain geodesic ***,since a bisector comprises hyperbolic and line segments,we utilize Apollonius diagrams to encode complicated structures,enabling Voronoi diagrams to encode a medial-axis surface for a dense set of boundary *** on these strategies,we present an approximation algorithm for efficient Voronoi diagram construction on triangulated *** also suggest a measure for evaluating similarity of our results to the exact *** our GVD results are constructed using approximate geodesic distances,we can get GVD results similar to exact results by inserting Steiner points on triangle *** results on many 3D models indicate the improved speed and memory requirements compared to previous leading methods.
Image retrieval is a crucial research task in the field of computer vision, and food image retrieval is an application of fine-grained image retrieval in food computation tasks. The feature extraction of food image vi...
详细信息
The identification of GUI elements in a user interface design diagram is fundamental to many software engineering tasks. In order to solve the problems of low detection accuracy of GUI element recognition, low recogni...
详细信息
Deep multi-view subspace clustering (DMVSC) based on self-expression has attracted increasing attention dueto its outstanding performance and nonlinear application. However, most existing methods neglect that viewpriv...
详细信息
Deep multi-view subspace clustering (DMVSC) based on self-expression has attracted increasing attention dueto its outstanding performance and nonlinear application. However, most existing methods neglect that viewprivatemeaningless information or noise may interfere with the learning of self-expression, which may lead to thedegeneration of clustering performance. In this paper, we propose a novel framework of Contrastive Consistencyand Attentive Complementarity (CCAC) for DMVsSC. CCAC aligns all the self-expressions of multiple viewsand fuses them based on their discrimination, so that it can effectively explore consistent and complementaryinformation for achieving precise clustering. Specifically, the view-specific self-expression is learned by a selfexpressionlayer embedded into the auto-encoder network for each view. To guarantee consistency across views andreduce the effect of view-private information or noise, we align all the view-specific self-expressions by contrastivelearning. The aligned self-expressions are assigned adaptive weights by channel attention mechanism according totheir discrimination. Then they are fused by convolution kernel to obtain consensus self-expression withmaximumcomplementarity ofmultiple views. Extensive experimental results on four benchmark datasets and one large-scaledataset of the CCAC method outperformother state-of-the-artmethods, demonstrating its clustering effectiveness.
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of accurately matching and identifying persons across several camera views that do not overlap with one another. This is of utmost importance to video surveillance, public safety, and person-tracking applications. However, vision-related difficulties, such as variations in appearance, occlusions, viewpoint changes, cloth changes, scalability, limited robustness to environmental factors, and lack of generalizations, still hinder the development of reliable person re-ID methods. There are few approaches have been developed based on these difficulties relied on traditional deep-learning techniques. Nevertheless, recent advancements of transformer-based methods, have gained widespread adoption in various domains owing to their unique architectural properties. Recently, few transformer-based person re-ID methods have developed based on these difficulties and achieved good results. To develop reliable solutions for person re-ID, a comprehensive analysis of transformer-based methods is necessary. However, there are few studies that consider transformer-based techniques for further investigation. This review proposes recent literature on transformer-based approaches, examining their effectiveness, advantages, and potential challenges. This review is the first of its kind to provide insights into the revolutionary transformer-based methodologies used to tackle many obstacles in person re-ID, providing a forward-thinking outlook on current research and potentially guiding the creation of viable applications in real-world scenarios. The main objective is to provide a useful resource for academics and practitioners engaged in person re-ID. IEEE
To reduce the acquisition cost of aerodynamic heating data for high-speed aircraft by leveraging diverse data sources, this paper proposes a multi-source data fusion method based on sparse sampling and multi-fidelity ...
详细信息
Graphconvolutional networks(GCNs)have become prevalent in recommender system(RS)due to their superiority in modeling collaborative *** improving the overall accuracy,GCNs unfortunately amplify popularity bias-tail ite...
详细信息
Graphconvolutional networks(GCNs)have become prevalent in recommender system(RS)due to their superiority in modeling collaborative *** improving the overall accuracy,GCNs unfortunately amplify popularity bias-tail items are less likely to be *** effect prevents the GCN-based RS from making precise and fair recommendations,decreasing the effectiveness of recommender systems in the long *** this paper,we investigate how graph convolutions amplify the popularity bias in *** theoretical analyses,we identify two fundamental factors:(1)with graph convolution(i.e.,neighborhood aggregation),popular items exert larger influence than tail items on neighbor users,making the users move towards popular items in the representation space;(2)after multiple times of graph convolution,popular items would affect more high-order neighbors and become more *** two points make popular items get closer to almost users and thus being recommended more *** rectify this,we propose to estimate the amplified effect of popular nodes on each node's representation,and intervene the effect after each graph ***,we adopt clustering to discover highly-influential nodes and estimate the amplification effect of each node,then remove the effect from the node embeddings at each graph convolution *** method is simple and generic-it can be used in the inference stage to correct existing models rather than training a new model from scratch,and can be applied to various GCN *** demonstrate our method on two representative GCN backbones LightGCN and UltraGCN,verifying its ability in improving the recommendations of tail items without sacrificing the performance of popular *** are open-sourced^(1)).
暂无评论