The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hybrid beamforming architecture that combines analog beamforming and digital beamforming has been widely accepted in the emerging millimeter-wave (mmWave) systems with large antenna arrays. However, the design of codebooks and beam training procedures at the analog stage is problematic in mmWave system. In this study, we propose a feasible two-stage 3D codebook design consisting of a primary codebook...
In this paper we propose a novel bottom-up visual saliency detection model by analysis of image complexity. Compared with existing works, we emphasize the important impact of image complexity on saliency detection. Inspired by the free energy theory, a hybrid parametric and non-parametric model is used to estimate the complexity of a visual signal. Taking the image complexity as a new feature, this...
Commercial advertisement dissemination is one of the most promising applications in self-organizing mobile social networks (SMSN). Lightweight incentives are essential to encourage the participation of mobile users, given that only a few users are voluntary due to limited resources in mobiles. However, existing incentives overlook dishonest behaviors of relays in overstating their costs for higher...
The branch information is disclosed during software execution. In a malicious host, adversaries could collect predicates from leaked branch information using concolic execution technique. Exploiting collected predicates, adversaries could accurately reason about software's internal logic, which is a significant threat to software intellectual property protection. In order to mitigate branch information...
QoS-based service selection becomes a commonly accepted procedure to support rapid and dynamic web service composition. In this paper, we study the problem of QoS-based service selection in distributed QoS management environments where QoS values of alternative services are maintained by distributed QoS registries. A distributed heuristic approach is proposed to solve the problem efficiently with...
Classification is an important problem in data mining. Given a database of records, each with a class label, a classifier generates a concise and meaningful description for each class that can be used to classify subsequent records. A number of popular classifiers construct decision trees to generate class models. In this paper, the idea of algorithm for building a decision tree is introduced by comparing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.