The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate the problem of modeling images and associated text for cross-modal retrieval tasks such as text-to-image search and image-to-text search. To make the data from image and text modalities comparable, previous cross-modal retrieval methods directly learn two projection matrices to map the raw features of the two modalities into a common subspace, in which cross-modal data...
Present higher education face one of challenges how to cultivate computer professional graduates with a satisfactory practical capability. Based on college-enterprise cooperation, our teaching of graduation practice is performed in enterprises or training institutions so as that students can master application knowledge. An e-learning practice platform can facilitate distant students to learn and...
The rapid development and wide utilization in Internet technologies has significantly affected contemporary educational systems. According to the teaching requirements of training high-quality applicative talents of our university, the traditional teaching mode of computer professional courses face a new challenge how to enhance the practical capabilities of students and give them the most frontier...
Detection of distributed denial of service (DDoS) attacks over the Internet is crucial for many Internet applications, such as electronic commerce, network games, P2P, etc. Based on anomaly detection information, network route selection, quality of service (QoS) provision, and traffic engineering can be performed to bypass the abnormal areas or to immigrate the attack traffic. To detect the DDoS attacks...
In contrast to many techniques exploiting temporal patterns of traffic from a single network element, network-wide traffic analysis mainly focuses on the spatial behavior across the whole network. This paper proposes a spatial hidden Markov model (SHMM) to learn the normal patterns of network-wide traffic. Combined with topology information, SHMM models traffic volumes on links as probabilistic outputs...
Identifying anomaly detection such as failure and attacks rapidly and accurately over the Internet holds interest of both network operators and researchers. Network behavior analysis (NBA) system is usually disposed over an intranet, passively collects SNMP data or flow data, and uses signature and anomaly mechanisms to identify and analyze interesting network activities, including traffic anomaly...
Geospatial computing today is highly manual requiring large amounts of human capital. The systems used for processing were designed for stand-alone environments, are inappropriate for modern distributed, heterogeneous network environments as Internet due to their closed architecture, and their lack of interoperability, reusability, and flexibility. The need of an intelligent architecture that can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.