The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The world is witnessing exploding interests in big data and its analytics, which makes data a critical and relevant asset more than ever for today's organizations. However, without a proper understanding to security and privacy requirements, data might hardly be used to its full power. Data owners and users can be in risk in terms of information security and privacy when sharing their data and running...
Fine-grained object recognition is more challenging than generic categorization due to the subtle difference between subcategories under the large intra-class pose change and appearance variations. The state-of-the-art fine-grained recognition methods usually utilize part detection or pose alignment to alleviate the pose variation, and then use convolutional neural networks (CNNs) to extract local...
Autostereoscopic TV provides users 3-D experience without wearing glasses. To overcome its poor resolution and to improve the 3-D perception, in this paper, based on Human Visual System (HVS) theory, some depth cues were added into the proposed system. It is shown in the result that the viewers can perceive the 3-D models twice as much as the conventional one. A 3-D model interaction system was built...
Person names and location names are essential building blocks for identifying events and social networks in historical documents that were written in literary Chinese. We take the lead to explore the research on algorithmically recognizing named entities in literary Chinese for historical studies with language-model based and conditional-random-field based methods, and extend our work to mining the...
This paper argues about a new conceptual modeling language for the White-Box (WB) security analysis. In the WB security domain, an attacker may have access to the inner structure of an application or even the entire binary code. It becomes pretty easy for attackers to inspect, reverse engineer, and tamper the application with the information they steal. The basis of this paper is the 14 patterns developed...
Graphical objects are important elements of freely handwritten notes but their segmentation from the document is challenging due to their irregular properties. This paper introduces an original solution for automatically segmenting diagrams and drawings from unstructured online documents. We propose a multi-scale representation of the document modeled as a hierarchical Conditional Random Field to...
Modelling 3D stratum surface is difficult because the number of exploratory holes is usually too small. As an attempt to solve this problem, many interpolation methods were proposed to estimate the surface between the holes. In this paper, we propose an approach to interpolate 3D spatial points and model stratum surface. The curvature of the original surface mesh is embedded into kriging interpolation...
This paper proposes a new method for fast text localization in natural scene images by combining learning-based region filtering and verification in a coarse-to-fine strategy. In each pyramid layer, a boosted region filter is used to extract candidate text regions, which are segmented into candidate text lines by multi-orientation projection analysis. A polynomial classifier with combined features...
Annotating the regions, text lines and characters of document images is an important, but tedious and expensive task. A ground-truthing tool may largely alleviate the human burden in this process. This paper describes an automated recognition-based tool GTLC for finding the best alignment between the text transcript and the connected components of unconstrained handwritten document image. The alignment...
Based on the survey results of Chinese requirements engineering practices, this paper reports a few general patterns of Chinese-culture-related ways of thinking and their influence to requirements elicitation activities. A multimedia enhanced goal oriented requirement elicitation method is proposed, in which media measures are used to help capture user requirements and preferences more easily. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.