In this paper, we present a novel constrained texture mapping method based on the harmonic map. We first project the surface of a 3D model on a planar domain by an angle-based-flattening technique and perform a parame...
详细信息
Mobile device is one of the most widespread devices with rendering capabilities now. With the improved performance of the mobile device, displaying 3D scene becomes reality. This paper implements an optimized soft 3D ...
详细信息
Active Queue Management (AQM) is an effective method to enhance congestion control, and to achieve tradeoff between link utilization and delay. The de facto standard, Random Early Detection (RED), and most of its vari...
详细信息
Automatic image annotation is an important but highly challenging problem in content-based image retrieval. This paper introduces a new procedure for providing images with semantic keywords. To bridge the semantic gap...
详细信息
Automatic image annotation is an important but highly challenging problem in content-based image retrieval. This paper introduces a new procedure for providing images with semantic keywords. To bridge the semantic gap, classified images are used to train a special multi-class classifier which maps the visual image feature into the model space. The model-vectors that construct the model space are more appropriate for the image content and are applied to each individual image. Soft labels are then given to the unannotated images during the propagation procedure, and as a keyword, each label is associated with a membership confidence in probability. Thus conceptualized annotation of images could be provided to users. An empirical study of the COREL image database showed that the proposed model-vectors outperformed visual features by 14.0% in the F-measure for annotation.
Originated from human immune system, artificial immune system has been widely applied in the computational fields, especially for the task of anomaly detection. Although intensively investigated in the literature, mos...
详细信息
Originated from human immune system, artificial immune system has been widely applied in the computational fields, especially for the task of anomaly detection. Although intensively investigated in the literature, most of the artificial immune systems involve the process of model pre-definition according to the specific scenarios to be coped with. The pre-definition, however, could cause the system to be unreliable and inflexible. Instead, we propose in this paper an integrated artificial immune system platform, which can automatically adapt to various types of immune models. For a particular object to be detected, the platform is able to configure the model set dynamically based on the "pressure" produced during the course of training and testing. In addition, a hybrid evaluation of multi-AIS-models is employed in the integrated platform to improve the self-adaptability of the system.
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate webpage owner can use this approach to se...
详细信息
ISBN:
(纸本)1595930515
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate webpage owner can use this approach to search the Web for suspicious webpages which are visually similar to the true webpage. A webpage is reported as a phishing suspect if the visual similarity is higher than its corresponding preset threshold. Preliminary experiments show that the approach can successfully detect those phishing webpages for online use.
Former approaches to VHE resulted in considerable traffic loads and security threats by moving service logics across networks. In order to minimize extra traffic resulted by VHE, here we employ semantic Web technology...
详细信息
Former approaches to VHE resulted in considerable traffic loads and security threats by moving service logics across networks. In order to minimize extra traffic resulted by VHE, here we employ semantic Web technology to setup a semantic background, upon which VHE could comprehend the expectations of users and the abilities of services, thus could automatically and precisely select an appropriate local service for a service request of a roaming user. As a first step to reach the semantic Web enabled VHE, we model related knowledge into ontologies and present a suggested architectural framework.
Self-certified public keys are proposed to eliminate the burden of verifying the public key before using. To alleviate reliance on system authority and strengthen the security of system, Chang et al propose a new digi...
详细信息
Self-certified public keys are proposed to eliminate the burden of verifying the public key before using. To alleviate reliance on system authority and strengthen the security of system, Chang et al propose a new digital signature schemes, no redundancy is needed to be embedded in the signed messages in this scheme. Moreover, Chang et al claimed that the schemes are still secure even - without the trustworthy system authority, and only the specified recipient can recover the message in his authentication encryption schemes. Unfortunately, In this work, we analyze the security of Chang et al scheme and show that if the system authority is trustless, the scheme is insecure, namely, the system authority can recover the message without the private key of the recipient in Chang' authentication encryption schemes. Finally, we propose an improved scheme to overcome the weakness of Chang et al scheme.
When a TCP stream goes through a broadband satellite network with a large bandwidth-delay product, the congestion window of the TCP stream is usually big so that there are lots of strongly bursty traffic on the networ...
详细信息
When a TCP stream goes through a broadband satellite network with a large bandwidth-delay product, the congestion window of the TCP stream is usually big so that there are lots of strongly bursty traffic on the network, which makes the intermediate nodes in the network so easily into the congested state, thus having a negative impact on overall network efficiency. This paper analyses the case and proposes an improved scheme: TCP-regular, so that TCP packets are sent not in burst but in regular over an entire round-trip time. Simulation shows that TCP-regular effectively enhances the overall efficiency and robustness of the broadband satellite networks.
We introduce a novel intelligent system which can generate new Chinese calligraphic artwork that meets certain aesthetic requirements automatically. In the machine learning phase, parametric representations of existen...
详细信息
We introduce a novel intelligent system which can generate new Chinese calligraphic artwork that meets certain aesthetic requirements automatically. In the machine learning phase, parametric representations of existent calligraphic artwork are derived from input images of calligraphy. Using a six-level hierarchical representation, the acquired knowledge is organized as a small structural stroke database, which is then exploited by a constraint-based analogous reasoning component to create artwork in new styles. A set of geometric constraints is proposed and incorporated into the system for rejecting the aesthetically unacceptable results. The combination of knowledge from various input sources creates a huge space for the intelligent system to explore and produce new calligraphy.
暂无评论