High baud rate optical transceiver based on time division multiplexing technology is proposed. A communication channel at 80GBoud with 4 bit streams at 20Gbps is realized by 4-stage cascaded high speed switches with s...
详细信息
With the rapid development and application of cloud computing, there exist plenty of clouds that are distributed on the open Internet, decentralized in the management, evolving with various services providing diverse ...
详细信息
The key escrow problem and high computational cost are the two major problems that hinder the wider adoption of hierarchical identity-based signature (HIBS) scheme. HIBS schemes with either escrow-free (EF) or online/...
详细信息
Interconnection network plays an essential role in the architecture of large-scale high performance computing (HPC) systems. In the paper, we construct a novel family of lowdiameter topologies, Galaxyfly, using techni...
详细信息
Spin-transfer torque random access memory (STT-RAM) is one of the most promising substitutes for universal main memory and cache due to its excellent scalability, high density and low leakage power. Nevertheless, the ...
详细信息
An android mobile phone is one of the most anticipated smart phone operating systems on the market. The open source Android platform not only allow developer to take full advantage of the mobile system, but also raise...
详细信息
An android mobile phone is one of the most anticipated smart phone operating systems on the market. The open source Android platform not only allow developer to take full advantage of the mobile system, but also raises significant issues related to malicious applications(Apps). Although understanding the android malware using dynamic analysis can provide a compressive view and it is still subjected to high cost in environment development and manual effort in investigation. In this study our proposed approach provides a static and dynamic analyst paradigm for detecting android malware. The mechanism considers the static information including permissions, deployment of components, intent message passing and API calls for characterizing the android application behavior. In order to recognize different intentions of android malware, different kind of clustering and classification can be applied to enhance the malware detection capability. Our approach extracts the information from the each APKs manifest file, and regards component(Activity, Receiver, Services) as entry points drilling down for tracing API calls related to permissions. Next it applies detection methods based on matching(Signature matching) and learning(SVM and random forest) algorithm to classify the applications as benign or malicious. The experimental results show that the accuracy of our approach is better than one of the well-known tool, Androguard, also it is efficient since its take half of the time than Androguard to predict 600 applications as benign or malicious. The open source Android platform allows developer to take full advantage of the mobile.
In this paper, we consider a wide class of constrained nonconvex regularized minimization problems, where the constraints are linearly constraints. It was reported in the litera- ture that nonconvex regularization usu...
详细信息
A new Gaussian mixture model is used to improve the quality of propagation method for SFS in this paper. The improved algorithm can overcome most difficulties of propagation SFS method including slow convergence, inte...
详细信息
A data-driven method was proposed to realistically animate garments on human poses in reduced space. Firstly, a gradient based method was extended to generate motion sequences and garments were simulated on the sequen...
详细信息
A data-driven method was proposed to realistically animate garments on human poses in reduced space. Firstly, a gradient based method was extended to generate motion sequences and garments were simulated on the sequences as our training data. Based on the examples, the proposed method can fast output realistic garments on new poses. Our framework can be mainly divided into offline phase and online phase. During the offline phase, based on linear blend skinning(LBS), rigid bones and flex bones were estimated for human bodies and garments, respectively. Then, rigid bone weight maps on garment vertices were learned from examples. In the online phase, new human poses were treated as input to estimate rigid bone transformations. Then, both rigid bones and flex bones were used to drive garments to fit the new poses. Finally, a novel formulation was also proposed to efficiently deal with garment-body penetration. Experiments manifest that our method is fast and accurate. The intersection artifacts are fast removed and final garment results are quite realistic.
In this research, we apply the Green's theory for converting the partial differential equation to the boundary integral equation for geometric transformation. Green's theory is designed specifically for integr...
详细信息
暂无评论