Search results for " networking"

showing 10 items of 1264 documents

RootsGLOH2: embedding RootSIFT 'square rooting' in sGLOH2

2020

This study introduces an extension of the shifting gradient local orientation histogram doubled (sGLOH2) local image descriptor inspired by RootSIFT ‘square rooting’ as a way to indirectly alter the matching distance used to compare the descriptor vectors. The extended descriptor, named RootsGLOH2, achieved the best results in terms of matching accuracy and robustness among the latest state-of-the-art non-deep descriptors in recent evaluation contests dealing with both planar and non-planar scenes. RootsGLOH2 also achieves a matching accuracy very close to that obtained by the best deep descriptors to date. Beside confirming that ‘square rooting’ has beneficial effects on sGLOH2 as it happe…

FEATURE EXTRACTIONLOCAL FEATUREComputer scienceFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-invariant feature transformFEATURE MATCHING02 engineering and technologyRobustness (computer science)Euclidean geometryComputer Science::Multimedia0202 electrical engineering electronic engineering information engineeringBeneficial effectsSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - Informaticabusiness.industryImage matching020206 networking & telecommunicationsPattern recognitionCOMPUTER VISIONImage Matching Local Image Descriptors RootSIFT sGLOH2Computer Science::Computer Vision and Pattern RecognitionEmbedding020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessSoftwareSquare rootingIMAGE MATCHING
researchProduct

Uncommon Suffix Tries

2011

Common assumptions on the source producing the words inserted in a suffix trie with $n$ leaves lead to a $\log n$ height and saturation level. We provide an example of a suffix trie whose height increases faster than a power of $n$ and another one whose saturation level is negligible with respect to $\log n$. Both are built from VLMC (Variable Length Markov Chain) probabilistic sources; they are easily extended to families of sources having the same properties. The first example corresponds to a ''logarithmic infinite comb'' and enjoys a non uniform polynomial mixing. The second one corresponds to a ''factorial infinite comb'' for which mixing is uniform and exponential.

FOS: Computer and information sciencesCompressed suffix arrayPolynomialLogarithmGeneral MathematicsSuffix treevariable length Markov chain[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]Generalized suffix treeprobabilistic source0102 computer and information sciences02 engineering and technologysuffix trie01 natural scienceslaw.inventionCombinatoricslawComputer Science - Data Structures and AlgorithmsTrieFOS: Mathematics0202 electrical engineering electronic engineering information engineeringData Structures and Algorithms (cs.DS)Mixing (physics)[ INFO.INFO-DS ] Computer Science [cs]/Data Structures and Algorithms [cs.DS]MathematicsDiscrete mathematicsApplied MathematicsProbability (math.PR)020206 networking & telecommunicationssuffix trie.Computer Graphics and Computer-Aided Design[MATH.MATH-PR]Mathematics [math]/Probability [math.PR]010201 computation theory & mathematicsmixing properties60J05 37E05Suffix[ MATH.MATH-PR ] Mathematics [math]/Probability [math.PR]Mathematics - ProbabilitySoftware
researchProduct

A gap analysis of Internet-of-Things platforms

2016

We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet. To gain a widespread adoption, these middleware solutions, referred to as platforms, have to meet the expectations of different players in the IoT ecosystem, including device providers, application developers, and end-users, among others. In this article, we evaluate a representative sample of these platforms, both proprietary and open-source, on the basis of their ability to meet the expectations of different IoT users. The evaluation is thus more focused on how ready and usable these platforms are for IoT ecosystem players, rather than on t…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer science02 engineering and technologyGap analysiscomputer.software_genreWorld Wide WebComputer Science - Computers and SocietyOrder (exchange)Computers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringesineiden internetIoT ecosystemIoT marketplaceta113internet of Thingsbusiness.industry020206 networking & telecommunicationsIoT platformsData sharingMiddleware (distributed applications)Middleware020201 artificial intelligence & image processingThe InternetbusinessInternet of Thingsgap analysiscomputerComputer Communications
researchProduct

FIRST

2018

Thanks to the collective action of participating smartphone users, mobile crowdsensing allows data collection at a scale and pace that was once impossible. The biggest challenge to overcome in mobile crowdsensing is that participants may exhibit malicious or unreliable behavior, thus compromising the accuracy of the data collection process. Therefore, it becomes imperative to design algorithms to accurately classify between reliable and unreliable sensing reports. To address this crucial issue, we propose a novel Framework for optimizing Information Reliability in Smartphone-based participaTory sensing (FIRST) that leverages mobile trusted participants (MTPs) to securely assess the reliabil…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer scienceDistributed computingFrameworkCrowdsensing02 engineering and technologyTrustMobileComputer Science - Networking and Internet ArchitectureThe National MapInformation020204 information systems0202 electrical engineering electronic engineering information engineeringAndroid (operating system)ReputationPaceSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNetworking and Internet Architecture (cs.NI)Data collectionParticipatory sensingInformation quality020206 networking & telecommunicationsQualitySoftware deploymentWireless sensor networkACM Transactions on Sensor Networks
researchProduct

Optimized Kernel Entropy Components

2016

This work addresses two main issues of the standard Kernel Entropy Component Analysis (KECA) algorithm: the optimization of the kernel decomposition and the optimization of the Gaussian kernel parameter. KECA roughly reduces to a sorting of the importance of kernel eigenvectors by entropy instead of by variance as in Kernel Principal Components Analysis. In this work, we propose an extension of the KECA method, named Optimized KECA (OKECA), that directly extracts the optimal features retaining most of the data entropy by means of compacting the information in very few features (often in just one or two). The proposed method produces features which have higher expressive power. In particular…

FOS: Computer and information sciencesComputer Networks and CommunicationsKernel density estimationMachine Learning (stat.ML)02 engineering and technologyKernel principal component analysisMachine Learning (cs.LG)Artificial IntelligencePolynomial kernelStatistics - Machine Learning0202 electrical engineering electronic engineering information engineeringMathematicsbusiness.industry020206 networking & telecommunicationsPattern recognitionComputer Science ApplicationsComputer Science - LearningKernel methodKernel embedding of distributionsVariable kernel density estimationRadial basis function kernelKernel smoother020201 artificial intelligence & image processingArtificial intelligencebusinessSoftwareIEEE Transactions on Neural Networks and Learning Systems
researchProduct

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct

Learning User's Confidence for Active Learning

2013

In this paper, we study the applicability of active learning in operative scenarios: more particularly, we consider the well-known contradiction between the active learning heuristics, which rank the pixels according to their uncertainty, and the user's confidence in labeling, which is related to both the homogeneity of the pixel context and user's knowledge of the scene. We propose a filtering scheme based on a classifier that learns the confidence of the user in labeling, thus minimizing the queries where the user would not be able to provide a class for the pixel. The capacity of a model to learn the user's confidence is studied in detail, also showing the effect of resolution is such a …

FOS: Computer and information sciencesComputer Science - Machine LearningActive learning (machine learning)Computer scienceComputer Vision and Pattern Recognition (cs.CV)SVM0211 other engineering and technologiesComputer Science - Computer Vision and Pattern RecognitionContext (language use)02 engineering and technologyMachine learningcomputer.software_genreTask (project management)Machine Learning (cs.LG)Classifier (linguistics)0202 electrical engineering electronic engineering information engineeringFOS: Electrical engineering electronic engineering information engineeringbad statesElectrical and Electronic Engineeringphotointerpretationuser's confidence021101 geological & geomatics engineeringActive learning (AL)Pixelbusiness.industryRank (computer programming)Image and Video Processing (eess.IV)very high resolution (VHR) imagery020206 networking & telecommunicationsElectrical Engineering and Systems Science - Image and Video ProcessingClass (biology)General Earth and Planetary SciencesArtificial intelligenceHeuristicsbusinesscomputerIEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
researchProduct

Deep Q-Learning With Q-Matrix Transfer Learning for Novel Fire Evacuation Environment

2021

We focus on the important problem of emergency evacuation, which clearly could benefit from reinforcement learning that has been largely unaddressed. Emergency evacuation is a complex task which is difficult to solve with reinforcement learning, since an emergency situation is highly dynamic, with a lot of changing variables and complex constraints that makes it difficult to train on. In this paper, we propose the first fire evacuation environment to train reinforcement learning agents for evacuation planning. The environment is modelled as a graph capturing the building structure. It consists of realistic features like fire spread, uncertainty and bottlenecks. We have implemented the envir…

FOS: Computer and information sciencesComputer Science - Machine LearningComputer Science - Artificial IntelligenceComputer scienceQ-learningComputingMilieux_LEGALASPECTSOFCOMPUTINGSystems and Control (eess.SY)02 engineering and technologyOverfittingMachine Learning (cs.LG)FOS: Electrical engineering electronic engineering information engineering0202 electrical engineering electronic engineering information engineeringReinforcement learningElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550business.industry020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionArtificial Intelligence (cs.AI)Control and Systems EngineeringShortest path problemEmergency evacuationComputer Science - Systems and Control020201 artificial intelligence & image processingArtificial intelligenceTransfer of learningbusinessSoftwareIEEE Transactions on Systems, Man, and Cybernetics: Systems
researchProduct

Group Importance Sampling for particle filtering and MCMC

2018

Bayesian methods and their implementations by means of sophisticated Monte Carlo techniques have become very popular in signal processing over the last years. Importance Sampling (IS) is a well-known Monte Carlo technique that approximates integrals involving a posterior distribution by means of weighted samples. In this work, we study the assignation of a single weighted sample which compresses the information contained in a population of weighted samples. Part of the theory that we present as Group Importance Sampling (GIS) has been employed implicitly in different works in the literature. The provided analysis yields several theoretical and practical consequences. For instance, we discus…

FOS: Computer and information sciencesComputer Science - Machine LearningComputer sciencePosterior probabilityMonte Carlo methodMachine Learning (stat.ML)02 engineering and technologyMultiple-try MetropolisStatistics - Computation01 natural sciencesMachine Learning (cs.LG)Computational Engineering Finance and Science (cs.CE)Methodology (stat.ME)010104 statistics & probabilitysymbols.namesake[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingStatistics - Machine LearningArtificial IntelligenceResampling0202 electrical engineering electronic engineering information engineering0101 mathematicsElectrical and Electronic EngineeringComputer Science - Computational Engineering Finance and ScienceStatistics - MethodologyComputation (stat.CO)ComputingMilieux_MISCELLANEOUSMarkov chainApplied Mathematics020206 networking & telecommunicationsMarkov chain Monte CarloStatistics::ComputationComputational Theory and MathematicsSignal ProcessingsymbolsComputer Vision and Pattern RecognitionStatistics Probability and UncertaintyParticle filter[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingAlgorithmImportance samplingDigital Signal Processing
researchProduct

Deep Importance Sampling based on Regression for Model Inversion and Emulation

2021

Understanding systems by forward and inverse modeling is a recurrent topic of research in many domains of science and engineering. In this context, Monte Carlo methods have been widely used as powerful tools for numerical inference and optimization. They require the choice of a suitable proposal density that is crucial for their performance. For this reason, several adaptive importance sampling (AIS) schemes have been proposed in the literature. We here present an AIS framework called Regression-based Adaptive Deep Importance Sampling (RADIS). In RADIS, the key idea is the adaptive construction via regression of a non-parametric proposal density (i.e., an emulator), which mimics the posteri…

FOS: Computer and information sciencesComputer Science - Machine LearningImportance samplingComputer scienceMonte Carlo methodPosterior probabilityBayesian inferenceInferenceContext (language use)Machine Learning (stat.ML)02 engineering and technologyEstadísticaStatistics - ComputationMachine Learning (cs.LG)symbols.namesakeSurrogate modelStatistics - Machine LearningArtificial Intelligence0202 electrical engineering electronic engineering information engineeringAdaptive regressionEmulationElectrical and Electronic EngineeringModel inversionGaussian processComputation (stat.CO)EmulationApplied Mathematics020206 networking & telecommunicationsRemote sensingComputational Theory and MathematicsSignal Processingsymbols020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionStatistics Probability and UncertaintyAlgorithmImportance sampling
researchProduct