With the fast development of Internet and rapid acceptance of Web Service technology, more and more service resources have emerged. Service composition which integrates the functionalities of different services is a p...
详细信息
Matrix factorization techniques have been frequently applied in information retrieval, computer vision and pattern recognition. Among them, Non-negative Matrix Factorization (NMF) has received considerable attention d...
详细信息
In this paper, by bringing in a user defined nonnegative control matrix to form a new objective function, I modify the update rules correspondingly and propose a novel decreasing accelerated gradient descent method fo...
详细信息
This paper proposed an approach to rapidly generate 3D models for street-side buildings from street-side images, remote sensing images, and GPS information. Traditional modeling methods usually require a single user t...
详细信息
Reconciling scene realism with interactivity has emerged as one of the most important areas in making virtual reality feasible for large-scale CAD data sets consisting of several millions of primitives. Level of detai...
详细信息
New application traffic occurring on Internet frequently challenges the traditional traffic classifiers based on machine learning. These classifiers always identify it inaccurately and assign it into one of their know...
详细信息
Sparse Matrix-Vector Multiplication is an important computational kernel in scientific applications, and CSR storage algorithm often performs poorly on modern computer systems. But the register-level blocking algorith...
详细信息
ISBN:
(纸本)9780769533520
Sparse Matrix-Vector Multiplication is an important computational kernel in scientific applications, and CSR storage algorithm often performs poorly on modern computer systems. But the register-level blocking algorithm can optimize memory hierarchy access, reduce memory access time, and then improve the performance. RAM (h) is a computation model that has h-level memory hierarchies. It indicates that different implementation forms of the same algorithm can have different memory access complexity. In this paper, we try to analyze memory access compelxity of two implementation forms of SpMV(which are CSR storage algorithm and register-level blocking algorithm) and to predict the performance of SpMV through combining the memory access complexity analysis and the data movement/floating point operation ratio analysis. The performance data of two forms and Statistical results of miss number of L1, L2 and TLB on Pentium IV platform are listed. Model analytical results matched well with experimental results.
Based on the newly appeared image editing and image processing techniques, a novel interactive, computer-assisted system is proposed for facial synthesis. This paper presents the architecture of this facial synthesis ...
详细信息
ISBN:
(纸本)3540334238
Based on the newly appeared image editing and image processing techniques, a novel interactive, computer-assisted system is proposed for facial synthesis. This paper presents the architecture of this facial synthesis system and gives a detailed description of the four key modules. The techniques used in these modules are also particularized. First, graph cut algorithm is used to automatically select region. Then gradient domain fusion is used to get better result. Finally, k-means method is used to improve efficiency. The experimental results show that our experimental facial synthesis system can produce visually good synthesized face images.
Service-oriented self-adaptation software (SoSAS) utilizes services as fundamental elements for developing applications that have the capability to autonomously modify their behavior at run-time in response to changes...
详细信息
With the development of Internet and cloud computing, multimedia data, such as images and videos, has become one of the most common data types being processed. As the scale of multimedia data being still increasing, i...
详细信息
暂无评论