The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While great success has been demonstrated in numerous tracking algorithm, some challenging problems still remain such as motion, shape deformation and occlusion. In this paper, the proposed algorithm can work robustly to overcome the occlusion and fast movement in real -- world scenarios. A discriminative model based on the Gaussian superpixel model is constructed to descript the change of the target...
In this paper, it presents an effective caching algorithm based on random access with the finite storage size in distributed server architecture for networked video services. Under the general video traffic condition, it is observed that the storage size and total popular contents of edge video server affect the performance of the total video sever system, and channel bandwidth between edge video...
UHF RFID technology provides significant advantages over traditional object-tracking technologies and it is increasingly adopted and deployed in real applications. Tags collision problem is the key problem affecting the reading efficiency in UHF RFID systems. In this paper, it proposed fixed Q algorithm and adaptive Q algorithm to anti-collision. Both analytical and simulation results show that comparing...
RFID is a popular automatic identification technology currently, which will have large opportunities in the future. Communication algorithm is a key step for the design of RFID system. This paper propose design and implementation communication algorithm in software. There are many research activities in RFID hardware systems, but there is few in software infrastructure. In order to the implementation...
String matching is the most critical operation in network intrusion detection systems (NIDS) [1]. This paper proposes a novel memory-efficient string matching algorithm that only requires around 2% of the memory utilized in Aho-Corasick algorithm [2] but has more than 4 times the throughput of state-of-the-art algorithm with very limited memory resource. The proposed algorithm is flexible to fit different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.