The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, total variation based image deconvolution has shown its superior performance. The restoration quality is generally sensitive to the value of regularization parameter. In this work, we develop a data-driven optimization scheme based on minimization of Stein's unbiased risk estimate (SURE)—statistically equivalent to mean squared error (MSE). Based on a typical alternating direction method...
In this paper, the blind restoration of a degraded image with an auxiliary image from another sensor is considered. In a typical multispectral satellite imaging system, multiple images from different sensors of the same area are available. When one of those images in a multiple image set is degraded, another image in the set can be used as a prior image for restoration. A hybrid algorithm based on...
Existing VMI techniques have high overhead, and require customized introspection programs/tools for different guest OS versions - lack of generality. In this paper, we present Shadow Context, a system for close-to-real time manual-effort-free VMI. Shadow Context can meet several important real-world VMI needs which existing VMI techniques cannot. Compared to other automatic introspection tool generation...
Collaborative beamforming has been widely used in wireless sensor networks to improve the directivity of signals in long-distance transmission. The performance of collaborative beamforming has been well analyzed for the case without phase offset in the literature. However, there always exists the phase ambiguity caused by carrier phase jitter between the transmitter and receiver nodes in a practical...
At present, Embedded Linux has become research focus in embedded system field. In this paper, we focus on the analysis of Linux kernel, on the basis of analysis, we research and explore the key technologies of embedded Linux such as Linux porting methods on ARM, improvement of Linux real-time performance, development technology of Linux device drivers and so on. Through the research on the key technologies,...
Operating system security (OS) is the basis for trust computing. As the kernel rootkits become popular and lots of kernel vulnerabilities are exposed, the OS kernel suffers a large number of attacks. It is difficult to protect the kernel by its own module because the kernel rootkits has the same ability to cripple the security module within the same kernel space. Recently, with the virtualization...
As a classical security policy, DTE (domain and type enforcement) is usually used to protect the integrity of information and implemented in many famous security operating systems. But there are three main questions for most systems that have implemented DTE security policy as follows: 1) security policy enforcing module is easy to be tampered and bypass before loaded; 2) The content of security policy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.