Inaccuracy depth estimation may influence on depth coding and virtual view rendering in the free-viewpoint television (FTV) system, an improved depth map estimation is proposed to solve the problem for coding and view...
详细信息
Inaccuracy depth estimation may influence on depth coding and virtual view rendering in the free-viewpoint television (FTV) system, an improved depth map estimation is proposed to solve the problem for coding and view synthesis. Firstly, check the consistency of initial depth, and the influence of initial miss-matches is minimized by introduction of an additional adaptive matching error selection that penalizes the unreliable matches. Then according to certain criteria, the multi-reference depth maps are merged into one disparity map to improve the quality of disparity map. Finally, a multilateral filtering is used to preserve details in the depth map and simultaneously smooth the depths in occluded areas at object boundary, less texture and discontinuity regions. Experimental results show a significant improvement of the initial input depth maps and coding efficiency, as well as a reduction of view synthesis artifacts.
The limitation of the existing methods of traffic data collection is that they rely on techniques that are strictly local in nature. The airborne system in unmanned aircrafts provides the advantages of wider view angl...
详细信息
The limitation of the existing methods of traffic data collection is that they rely on techniques that are strictly local in nature. The airborne system in unmanned aircrafts provides the advantages of wider view angle and higher mobility. However, detecting vehicles in airborne videos is a challenging task because of the scene complexity and platform movement. Most of the techniques used in stationary platforms cannot perform well in this situation. A new and efficient method based on Bayes model is proposed in this paper. This method can be divided into two stages, attention focus extraction and vehicle classification. Experimental results demonstrated that, compared with other representative algorithms, our method obtained better performance with higher detection rate, lower false positive rate and faster detection speed.
Network diagnosis is crucial in managing a wireless sensor network (WSN) since many network-related faults, such as node and link failures, can easily happen. Diagnosis tools usually consist of two key components, inf...
详细信息
Network diagnosis is crucial in managing a wireless sensor network (WSN) since many network-related faults, such as node and link failures, can easily happen. Diagnosis tools usually consist of two key components, information collection and root-cause deduction, while in most cases information collection process is independent with root-cause deduction. This results in either redundant information which might pose high communication burden on WSNs, or incomplete information for root-cause inference that leads false judgments. To address the issue, we propose DID, a directional diagnosis approach, in which the diagnosis information acquirement is guided by the fault inference process. Through several rounds of incremental information probing and fault reasoning, root causes of the network abnormalities with high credibility are deduced. We employ a node tracing scheme to reconstruct the topical topology of faulty regions and build the inference model accordingly. We implement the DID approach in our forest monitoring sensor network system, GreenOrbs. Experimental results validate the scalability and effectiveness of this design.
Virtualization enables multiple guest operating systems run on a single physical platform. These virtual machines may host any types of application, including concurrent HPC programs. Traditionally, VMM schedulers hav...
详细信息
Recently, Multiplayer Online Game has been extremely popular, in which peer-to-peer technology has been introduced to help with the scaling. This paper presents a measurement study on a P2P-based MOG supporting system...
详细信息
Most of the current dynamic binary translation (DBT) systems are single-threaded and many orders of magnitude slower than native execution. Although multi-core processors are becoming more and more prevalent, the sing...
详细信息
CPU time accounting is a basis of performance measurement and process scheduling in operating system. Accounting operations are traditionally completed in timer interrupt handler since timer interrupt is periodically ...
详细信息
Constrained optimization problems compose a large part of real-world applications. More and more attentions have gradually been paid to solve this kind of problems. An improved particle swarm optimization (IPSO) algor...
详细信息
Constrained optimization problems compose a large part of real-world applications. More and more attentions have gradually been paid to solve this kind of problems. An improved particle swarm optimization (IPSO) algorithm based on feasibility rules is presented in this paper to solve constrained optimization problems. The average velocity of the swarm and the best history position in the particle's neighborhood are introduced as two turbulence factors, which are considered to influence the fly directions of particles, into the algorithm so as not to converge prematurely. The performance of IPSO algorithm is tested on 13 well-known benchmark functions. The experimental results show that the proposed IPSO algorithm is simple, effective and highly competitive.
With the rapid development of virtualization technology as well as the good performance of computer hardware, virtual machine is beginning to gradually increase the performance of display to meet the needs of desktop ...
详细信息
Content sharing is one of the most significant issues of Digital Rights Management (DRM). There are many requirements of rational content sharing between different users who are not family members. But, the main goals...
详细信息
Content sharing is one of the most significant issues of Digital Rights Management (DRM). There are many requirements of rational content sharing between different users who are not family members. But, the main goals of various sharing schemes are to solve the portability problem instead of rational content sharing between different users who are not family members. In this work, we propose an initial step toward the rational sharing between different users and present a sharing model based on proxy re-encryption. Our model supports flexible sharing mechanisms, with which the user can choose any of the purchased content to share with any legal device, and the content provider can know and limit the number of the sharing devices to achieve some novel DRM policies such as pay-per-sharing. To our best knowledge, our sharing model is the first model for the content sharing between different users' devices who are not family members using proxy re-encryption. With rational applications, our model can benefit both the user and content provider to achieve win-win development.
暂无评论