The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a novel progressive framework to optimize deep neural networks. The idea is to try to combine the stability of linear methods and the ability of learning complex and abstract internal representations of deep learning methods. We insert a linear loss layer between the input layer and the first hidden non-linear layer of a traditional deep model. The loss objective for optimization is a weighted...
Infinite hidden conditional random fields has been proposed for human behavior analysis which is a non-parametric discriminative model as the extension of HCRF. However, it only model one dimensional temporal relationship by using a chain structure imposed on latent state variables, and would involve huge number of parameters as the number of state increases. In order to solve the 2D object segmentation...
Compressive sampling (CS) theory and distributed video coding (DVC) are two techniques suitable to scenarios where a video codec with simple encoder and complex decoder is desired. The combination of CS theory and DVC is a new research trend in this field and several integrated schemes have now appeared. However, in these existing integrated schemes, the dependencies between measurements of successive...
Biometrics is the only factor that is directly linked with the distinguishing characteristic of an individual and has been widely applied to identity authentication, biometrics-based key management system may be expected to be a powerful competitor in the future. A popular technique of such a system is the fuzzy vault scheme. In this paper, a new scheme is proposed, which referred to as encrypted...
Cancelable biometrics may be a good approach to address the security and privacy concerns on biometric authentication. It uses some parameterized transforms to convert an original biometric template into a new version for authentication. The security of cancelable biometrics lies on noninvertibility of the transformed template, that is, the transforms should be noninvertible so that the original template...
We investigate the problem of constructing optimal layered multicast for heterogeneous sink nodes using network coding. Taking the flexibility of layered coding into account, we discuss the optimization problem that determines the optimal layers' bit-rates for layered multicast, and express it into a mathematical formulation. Finding that this formulation is nonlinear and difficult to solve, we reduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.