The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Learning to hash has been widely applied to approximate nearest neighbor search for large-scale multimedia retrieval, due to its computation efficiency and retrieval quality. Deep learning to hash, which improves retrieval quality by end-to-end representation learning and hash encoding, has received increasing attention recently. Subject to the ill-posed gradient difficulty in the optimization with...
Device-to-device (D2D) communication is widely used for mobile devices and Internet of Things (IoT). Authentication and key agreement are critical to build a secure channel between two devices. However, existing approaches often rely on a pre-built fingerprint database and suffer from low key generation rate. We present GeneWave, a fast device authentication and key agreement protocol for commodity...
When considering person re-identification (re-ID) as a retrieval process, re-ranking is a critical step to improve its accuracy. Yet in the re-ID community, limited effort has been devoted to re-ranking, especially those fully automatic, unsupervised solutions. In this paper, we propose a k-reciprocal encoding method to re-rank the re-ID results. Our hypothesis is that if a gallery image is similar...
Energy efficiency and reliability are a pair of the most important factors in wireless sensor networks (WSNs). Recent research results have demonstrated that the previously suggested scheme of the joint network-coding-compressive-sensing can greatly improve the energy efficiency and the communication reliability of WSNs. In this paper, we propose a practical scheme, Non-Binary Joint Network-Coding...
Wireless sensor networks (WSNs) have significant limitations in available bandwidth and energy. The limited bandwidth in sensor networks can cause higher message delivery latency. In this demo, we demonstrate working of novel Zorder based data compression schemes (Z- compression) to reduce energy and save bandwidth without increasing the message delivery latency using a TelosB motes based sensor network...
This paper proposes a method based on the bag-of-words (BoW) and the softmax regression for microscopic image classification. Essentially, the locality-constrained linear coding (LLC) is adopted for local feature encoding. Compared with the traditionally adopted vector quantization (VQ) in the BoW framework, the LLC encodes local structures of microscopic images with lower quantization errors and...
Bitmap indexing is a promising approach for indexing. However the huge space consumption hinders the wide adoption of bitmap indexing, especially in memory-critical area such as packet classification. To this end, a variety of compression scheme are proposed to reduce the space consumption and simultaneously maintain the fast calculation which is a focused feature of bitmap indexing. In this paper,...
China's cultural industry entered a critical stage, and in order to make up for the disadvantages in China's global development strategy, we must emphasis the value of share and build a new cultural system platform as a breakthrough, proposing a fundamental solution to a series of major problems that limited domestic cultural development. The main reason for restricting the development of public cultural...
In the tornado code, cascading with traditional erasure codes (mostly Reed-Solomon codes) is always used to protect the last level, which will enhance the erasure correcting performance. However, this method increases the complexity in the process of encoding and decoding. In this paper, we introduce an improved algorithm to get linear coding complexity and simplify the implementation of decoder in...
Archiving of the Internet traffic is essential for analyzing network events in the field of network security and network forensics. The bitmap index is widely used to achieve fast searching in archival traffic data requiring a large storage space. As current state-of-art, WAH, PLWAH and COMPAX are proposed for compressing bitmap indexes. In this paper, a new bitmap index compression scheme, named...
Several conventional methods have been implemented in pattern recognition, but few of them have biological plausibility. This paper mimics the hierarchical visual system and uses the precise-spike-driven (PSD) synaptic plasticity rule to learn. The well-known HMAX model imitates the visual cortex and uses Gabor filter and max pooling to extract features. Compared with the traditional HMAX model, our...
Efficient retrieval of traffic archival data is a must-have technique to detect network attacks, such as APT(advanced persistent threat) attack. In order to take insight from Internet traffic, the bitmap index is increasingly used for efficiently querying over large datasets. However, a raw bitmap index leads to high space consumption and overhead on loading indexes. Various bitmap index compression...
A novel approach to design capacity-approaching variable-length constrained sequence codes has recently been developed. A critical step in this design process is the construction of minimal sets based on a finite state machine description of the encoders. In this paper we propose three generalized criteria to select the state that will result in construction of the minimal set with the best achievable...
This paper presents a framework for evaluating quality of video encoding algorithms. This technique works by collecting source videos, encoding the source videos with a given algorithm, and decoding the compressed sequences. The decoded video shall be measured with the original sources in a specific evaluation method and feedback to the algorithm. Under the guidance of this framework, an implementation...
Distributed storage systems (DSSs) can provide reliable access to data over individually unreliable nodes for a long period of time. Regenerating codes (RCs) are efficient at both storage and repair bandwidth, and thus are regarded as a promising option for DSSs. In this paper, the generalized RCs (GRCs) are considered, which possess the relaxed conditions on reconstruction sets and regeneration sets...
This paper presents a novel local surface descriptor called rotational contour signatures (RCS) for 3D rigid objects. RCS comprises several signatures that characterize the 2D contour information derived from 3D-to-2D projection of the local surface. The inspiration of our encoding technique comes from that, viewing towards an object, its contour is an effective and robust cue for representing its...
Cultivar identification is an important aspect in agriculture and also a typical task of fine-grained visual categorization (FGVC). In comparison with other common topics in FGVC, studies on this problem are somewhat lagged and limited. In this paper, targeting four Chinese maize cultivars of Jundan No.20, Wuyue No.3, Nongda No.108, and Zhengdan No.958, we first consider the problem of identifying...
The desktop virtualization environment could propose a solution for the high-definition video processing, which used multi-GPU collaboration and parallel computing. The multi-GPU parallel encoding computing is often implemented by multi-threads mode. Based on the analysis of the GPU multi-level storage structure, and data transmission between CPU and GPU, pinned memory (zero-copy memory) and shared...
Decoding of Raptor codes consists of decoding of both the LT part and the precode part of the codes. When LT decoding is performed, a scenario may arise where the message passing-based decoding process is unable to provide non-zero log-likelihood ratio (LLR) updates to a fraction of input symbols even if it is mathematically possible to do so. The problem is even more critical for codes with short...
In recent years, most of the research about distributed video coding focus on how to get the exact side-information and virtual channel estimation parameters in order to achieve better rate-distortion performance. However, there is quite few research about the practical transmission issue, i.e., no practical and effective transmission scheme has been proposed yet for distributed video coding (DVC)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.