The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose Sequential Grouping Networks (SGN) to tackle the problem of object instance segmentation. SGNs employ a sequence of neural networks, each solving a sub-grouping problem of increasing semantic complexity in order to gradually compose objects out of pixels. In particular, the first network aims to group pixels along each image row and column by predicting horizontal and vertical...
This paper presents a recursive oblique projector using the Gram-Schmidt process. The recursive construction of oblique projectors allows a receiver to prevail interference and noise environment in direct-sequence code-division multiple-access (DS/CDMA) system. When the number of the interfering users in the system increases or decreases, the oblique projector is recursively updated by the proposed...
The paper addresses a fast implementation algorithm about distributed fusion with CPHD filter. An implementation method of distributed fusion based on maximum probability association (MPA), called MPA-DF, is presented. Though the performance of MPA-DF is a little worse than traditional Generalization Covariance Intersection (GCI) distributed fusion method, called GCI-DF, the former needs lower computational...
Cyber security has become a vital issue in cyber-physical systems. This paper analyzes trade-off between security and performance of networked control system, which is related to the time delay by the data encryption and decryption procedure. In addition, we build up an experimental control platform using a remotely controlled servo system, and evaluate the affection of DES encryption system on the...
Program understanding plays a pivotal role in software maintenance and evolution: a deep understanding of code is the stepping stone for most software-related activities, such as bug fixing or testing. Being able to measure the understandability of a piece of code might help in estimating the effort required for a maintenance activity, in comparing the quality of alternative implementations, or even...
Modern software development is increasingly collaborative. Open Source Software (OSS) are the bellwether; they support dynamic teams, with tools for code sharing, communication, and issue tracking. The success of an OSS project is reliant on team communication. E.g., in issue discussions, individuals rely on rhetoric to argue their position, but also maintain technical relevancy. Rhetoric and technical...
Detecting software security vulnerabilities and distinguishing vulnerable from non-vulnerable code is anything but simple. Most of the time, vulnerabilities remain undisclosed until they are exposed, for instance, by an attack during the software operational phase. Software metrics are widely-used indicators of software quality, but the question is whether they can be used to distinguish vulnerable...
Exponential increase and global access to read/write memory states in quantum computing simulation limit both the number of qubits and quantum transformations that can be currently simulated. Although quantum computing simulation is parallel by nature, spatial and temporal complexity are major performance hazards, making this an important application for HPC. A new methodology employing reduction...
This paper focuses on low complexity architectures for check node processing in Non-Binary LDPC decoders. To be specific, we focus on Extended Min-Sum decoders and consider the state-of-the-art Forward-Backward and Syndrome-Based approaches. We recall the presorting technique that allows for significant complexity reduction at the Elementary Check Node level. The Extended-Forward architecture is then...
Polar codes are a family of capacity-achieving error-correcting codes, and they have been selected as part of the next generation wireless communication standard. Each polar code bit-channel is assigned a reliability value, used to determine which bits transmit information and which parity. Relative reliabilities need to be known by both encoders and decoders: in case of multi-mode systems, where...
In this paper, an improved and low-complexity signal detection approach for large-scale multiple-input multiple-output (MIMO) systems has been proposed. This approach utilizes the preconditioning technique to accelerate the conventional detection algorithm based on Gauss-Seidel (GS) iterative method, and achieves a detection performance close to the minimum mean square error (MMSE) detection algorithm...
Polar codes were recently chosen to protect the control channel information in the next-generation mobile communication standard (5G) defined by the 3GPP. As a result, receivers will have to implement blind detection of polar coded frames in order to keep complexity, latency, and power consumption tractable. As a newly proposed class of block codes, the problem of polar-code blind detection has received...
Given a set of points P⊄ R^d and a kernel k, the Kernel Density Estimate at a point x∊R^d is defined as \mathrm{KDE}_{P}(x)=\frac{1}{|P|}\sum_{y\in P} k(x,y). We study the problem of designing a data structure that given a data set P and a kernel function, returns approximations to the kernel density} of a query point in sublinear time}. We introduce a class of unbiased estimators...
In this work, we give the first construction of high-rate locally list-recoverable codes. List-recovery has been an extremely useful building block in coding theory, and our motivation is to use these codes as such a building block. In particular, our construction gives the first capacity-achieving locally list-decodable codes (over constant-sized alphabet); the first capacity achieving} globally...
The number of IoT, the Internet of Things, deployments is on the rise worldwide. In particular, we are witnessing an emerging trend of smart cities all over the world. IoT requires hardware, software, integration, deployment and maintenance. Considering the complexity and burdens of the whole process of IoT activation, it is reasonable to deploy an area-scale platform to leverage IoT adoption. These...
The Multiple Institution Database for Investigating Engineering Longitudinal Development (MIDFIELD) is expanding from 14 to about 100 institutions across the USA. This special session aims to introduce participants to MIDFIELD, explore how to conduct research with such a resource, and explain how participants can access MIDFIELD.
Existing literature presents many cases of computational thinking analysis through the perspective of a skill set for 21st century. However it is important to go deeper and understand how computational thinking activities fosters the cognitive development of the young, especially if we want them to have “a significant advantage in problem solving”, becoming innovative thinkers [1]. To be innovative...
In this paper, the problem of echo cancellation in long acoustic impulse responses (AIRs) is highlighted. Three of the mostly-used recent NLMS-based sparse adaptive filtering algorithms are presented; and their performances in the context of acoustic echo cancellation (AEC) are studied and compared. The algorithms of interest include the improved proportionate normalized least mean square (IPNLMS),...
Projects, in Process-Aware Information Systems (PAIS) for medical scientific research, have as requirements all sorts of data coming from many interdependent processes. More concretely, in autopsy study, data are collected from two main interdependent processes: 1) material collection and processing; and 2) interview. These processes are the groundwork to optimize the association between biological...
In consistent flow migration, the task is to change the paths the flows take in the network, but without inducing congestion during the update process. Even though the rise of Software Defined Networks allows for centralized control of path changes, the execution is still performed in an inherently asynchronous system, the switches distributed over the network. To this end, a multitude of scheduling...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.