This paper proposes a novel video-based method to transfer the illumination from a single reference facial performance video to a target one taken under nearly uniform illumination. We first filter the key frames of t...
详细信息
This paper studies an image inpainting solution based on a primal sketch representation model [1], which divides an image into structure (sketchable) and texture (non-sketchable) components. This solution first predic...
详细信息
Trace-driven simulation methodology is the most widely used method to evaluate the design of future computer memory architecture. Since this methodology demands large amounts of storage and computer time, there is a g...
详细信息
This paper presents a retrieval method for the image of Chinese characters calligraphy. The precision and recall rate are main indicators to measure the quality of image retrieval algorithm. Starting from the two aspe...
详细信息
There not only exists the relation of the functional dependency and multi-valued dependency in XML data constraint,but also exists the relation of data dependency obtained only from a certain existing relationship ins...
详细信息
ISBN:
(纸本)9781138026445
There not only exists the relation of the functional dependency and multi-valued dependency in XML data constraint,but also exists the relation of data dependency obtained only from a certain existing relationship instance that is *** reducing data redundancy,in this paper,the concepts of XML functional dependency and XML multi-valued dependency based on the path expression in the Document Type Definition are *** then the inference rules on the condition of the coexistence of functional dependency and multi-valued dependency in XML are ***,the validity and completeness of the inference rules are *** above-mentioned fundamentally solves the problems of implication of functional dependency and multi-valued dependency in XML data,laying a theoretical foundation for XML database design.
This paper presents a photometric stereo method with nonisotropic point light sources. Subject to the non-uniform lighting conditions produced by the nonisotropic point sources, each incident light ray should be preci...
详细信息
The existing penetration testing systems need to rely on the professional skills in the testing process, so they increase the penetration testing of human resources and costs. While it also reduces the efficiency of t...
详细信息
Trace-driven cache simulation is the most widely used method to evaluate different cache structures. Several techniques have been proposed to reduce the simulation time of sequential trace-driven simulation. An obviou...
详细信息
Penetration testing is widely used to help ensure the security of the network. Traditional penetration testings were manually performed by tester according to scheme, the process is usually complex resulting in that i...
详细信息
Motion estimation is the key part of video compression since it removes the temporal redundancy within frames and significantly affects the encoding quality and efficiency. In this paper, a novel fast motion estimatio...
详细信息
暂无评论