The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to many shortcomings such as high cost, small coverage and small samples of methods based on GPS, license plate recognition or RFID for collecting traffic information, the methods based on mobile phone locations for collecting traffic information are more and more popular with the conditions of large number of users and advanced location technology about mobile phone. However, the map matching...
It has been shown that incorporation of human-specified high-level description of the target objects, e.g. labeled prior-knowledge data, can increase the performance of one-shot recognition. In this paper, we introduce latent components as a high level representation of the original objects and propose a cascade model for one-shot image recognition based on latent components learned by Hierarchical...
The use of 3-D whole body scanners has opened new opportunities for effective anthropometric data collection and its numerous applications. Meanwhile, there is a growing concern about whether the scan-derived measurements are comparable with the manual measurements. In this paper, an experiment was first conducted with 263 human subjects to evaluate the scan-derived measurements. By comparing the...
This paper analyzed the relationship between the nearest neighbour algorithm and the topology of reference tags used in LANDMARC, and proposed an optimal arrangement of reference tags. Simulation results showed that the new topology can provide better performance than the old one used in LANDMARC.
Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.