Search results for "CONSTRAINT"

showing 10 items of 361 documents

FISH: Face Intensity-Shape Histogram representation for automatic face splicing detection

2019

Abstract Tampered images spread nowadays over any visual media influencing our judgement in many aspects of our life. This is particularly critical for face splicing manipulations, where recognizable identities are put out of context. To contrast these activities on a large scale, automatic detectors are required. In this paper, we present a novel method for automatic face splicing detection, based on computer vision, that exploits inconsistencies in the lighting environment estimated from different faces in the scene. Differently from previous approaches, we do not rely on an ideal mathematical model of the lighting environment. Instead, our solution, built upon the concept of histogram-ba…

ExploitComputer scienceLighting environmentContext (language use)02 engineering and technologyImage Forensics Scene level analysis Geometric Constraints Lighting environment Face splicing detectionHistogram0202 electrical engineering electronic engineering information engineeringMedia TechnologyComputer visionElectrical and Electronic EngineeringRepresentation (mathematics)Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniIdeal (set theory)Scene level analysisSettore INF/01 - Informaticabusiness.industryImage forensicContrast (statistics)020207 software engineeringGeometric constraintFace (geometry)Signal Processing020201 artificial intelligence & image processingFace splicing detectionComputer Vision and Pattern RecognitionArtificial intelligencebusinessScale (map)
researchProduct

Adding Path-Functional Dependencies to the Guarded Two-Variable Fragment with Counting

2017

The satisfiability and finite satisfiability problems for the two-variable guarded fragment of first-order logic with counting quantifiers, a database, and path-functional dependencies are both ExpTime-complete.

FOS: Computer and information sciencesComputer Science - Logic in Computer ScienceTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESintegrity constraintssatisfiabilitycounting quantifierspath-functional dependenciesComputer Science::Logic in Computer Scienceguarded fragmentkey constraintstwo-variable fragmetLogic in Computer Science (cs.LO)
researchProduct

Adding Partial Functions to Constraint Logic Programming with Sets

2015

AbstractPartial functions are common abstractions in formal specification notations such as Z, B and Alloy. Conversely, executable programming languages usually provide little or no support for them. In this paper we propose to add partial functions as a primitive feature to a Constraint Logic Programming (CLP) language, namely {log}. Although partial functions could be programmed on top of {log}, providing them as first-class citizens adds valuable flexibility and generality to the form of set-theoretic formulas that the language can safely deal with. In particular, the paper shows how the {log} constraint solver is naturally extended in order to accommodate for the new primitive constrain…

FOS: Computer and information sciencesComputer Science - Programming LanguagesProgramming languageComputer scienceOrder (ring theory)computer.file_formatcomputer.software_genreNotationTheoretical Computer ScienceComputational Theory and MathematicsArtificial IntelligenceHardware and ArchitectureFormal specificationPartial functionConstraint logic programmingExecutableSet theorycomputerSoftwareConstraint satisfaction problemProgramming Languages (cs.PL)
researchProduct

REDUCTION OF CONSTRAINT SYSTEMS

1993

Geometric modeling by constraints leads to large systems of algebraic equations. This paper studies bipartite graphs underlaid by systems of equations. It shows how these graphs make possible to polynomially decompose these systems into well constrained, over-, and underconstrained subsystems. This paper also gives an efficient method to decompose well constrained systems into irreducible ones. These decompositions greatly speed up the resolution in case of reducible systems. They also allow debugging systems of constraints.

FOS: Computer and information sciencesDiscrete Mathematics (cs.DM)bipartite graphsmatchingperfect matching[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG]maximum matching[INFO.INFO-CG] Computer Science [cs]/Computational Geometry [cs.CG]geometric modelingComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONFOS: Mathematics[ INFO.INFO-CG ] Computer Science [cs]/Computational Geometry [cs.CG]Mathematics - CombinatoricsCombinatorics (math.CO)constraintsComputer Science - Discrete Mathematics
researchProduct

Estimation of causal effects with small data in the presence of trapdoor variables

2021

We consider the problem of estimating causal effects of interventions from observational data when well-known back-door and front-door adjustments are not applicable. We show that when an identifiable causal effect is subject to an implicit functional constraint that is not deducible from conditional independence relations, the estimator of the causal effect can exhibit bias in small samples. This bias is related to variables that we call trapdoor variables. We use simulated data to study different strategies to account for trapdoor variables and suggest how the related trapdoor bias might be minimized. The importance of trapdoor variables in causal effect estimation is illustrated with rea…

FOS: Computer and information sciencesStatistics and ProbabilityEconomics and EconometricsbiascausalityComputer scienceBayesian probabilityContext (language use)01 natural sciencesStatistics - ComputationMethodology (stat.ME)010104 statistics & probability0504 sociologyEconometrics0101 mathematicsComputation (stat.CO)Statistics - MethodologyestimointiEstimationSmall databayesilainen menetelmä05 social sciences050401 social sciences methodsEstimatorBayesian estimationidentifiabilityConstraint (information theory)functional constraintConditional independencekausaliteettiObservational studyStatistics Probability and UncertaintySocial Sciences (miscellaneous)
researchProduct

Exports of Spanish manufacturing firms and financial constraints

2020

We investigate the role of financial constraints on firms’ exporting behavior, including firms’ export decision, export intensity, firms starting to export decision, and exports persistence. Our financial constraints variable is a synthetic variable that summarizes information on different dimensions such as total assets, profitability, liquidity, solvency, repaying ability, and (new in this type of analyses) the cost of external financing. Using data on Spanish manufacturing for the period 1992–2014, we find evidence supporting that financial health is relevant to explain small and medium-sized enterprises (SMEs) exporting decisions and starting to export decisions but not those of large …

FinancePersistence (psychology)Economics and EconometricsF14business.industryStrategy and Management05 social sciencesSMEsFinancial constraintsGeneral Business Management and Accountingddc:650Firms0502 economics and businessC35Manufacturing firmsG32L60050207 economicsBusiness and International ManagementExports decisionsbusiness050203 business & managementBRQ Business Research Quarterly
researchProduct

Homeward Bound FDI: Are Migrants a Bridge over Trouble Finance?

2016

Migrants can lower cross-border investment barriers, help investors by providing information about their homeland and reduce transaction costs by sharing expertise on regulations, customs and procedures. In addition to generating these well-known networking effects, migrants can also provide valuable information about local finance, thereby easing the credit constraints foreign investors faced during the 2007 financial crisis. This paper sheds new light on the underlying mechanisms through which migration may affect foreign investment in the migrant's homeland by distinguishing between the effects on FDI's intensive and extensive margins. Gravity estimates for 140 countries for the period 2…

FinanceTransaction costEconomics and Econometricsbusiness.industryIntensive and extensive margins05 social sciencesFDIHomelandForeign direct investmentInvestment (macroeconomics)Bridge (interpersonal)Financial constraintsQuantile regressionMargin (finance)0502 economics and businessFinancial crisisEconomics050207 economicsbusinessGravity equationMigration050205 econometrics
researchProduct

Robotic assistance for industrial sanding with a smooth approach to the surface and boundary constraints

2021

[EN] Surface treatment operations, such as sanding, deburring, finishing, grinding, polishing, etc. are progressively becoming more automated using robotic systems. However, previous research in this field used a completely automatic operation of the robot system or considered a low degree of human-robot interaction. Therefore, to overcome this issue, this work develops a truly synergistic cooperation between the human operator and the robot system to get the best from both. In particular, in the application developed in this work the human operator provides flexibility, guiding the tool of the robot system to treat arbitrary regions of the workpiece surface; while the robot system provides…

Flexibility (engineering)021103 operations researchGeneral Computer ScienceOrientation (computer vision)Computer scienceWork (physics)0211 other engineering and technologiesGeneral EngineeringPolishingControl engineering02 engineering and technologyField (computer science)INGENIERIA DE SISTEMAS Y AUTOMATICAGrindingSmooth approachHuman-robot cooperationBoundary constraints0202 electrical engineering electronic engineering information engineeringRobot020201 artificial intelligence & image processingEnginyeria de sistemesRobotic armRobots
researchProduct

UML/OCL-based modeling of work-based access control policies for collaborative healthcare systems

2016

A work-based access control (WBAC) model is proposed by introducing the team role concept and modifying the user-role assignment model from a previous work. The main goals of WBAC are flexibility, easy manageability, security, as well as suitability to support cooperative work of dynamic teams in healthcare environments. One of the major challenges of WBAC regards authorization constraints in terms of organizational policies. In this article, we show how Unified Modeling Language (UML) and Object Constraints Language (OCL) are utilized to design and analyze the authorization constraints of WBAC in cooperative engagements with complex scenarios in the collaborative healthcare domain. We also…

Flexibility (engineering)021110 strategic defence & security studies021103 operations researchKnowledge managementComputer sciencebusiness.industry0211 other engineering and technologiesAccess control02 engineering and technologyObject (computer science)Domain (software engineering)Work (electrical)Unified Modeling LanguagebusinessSoftware engineeringcomputerObject Constraint Languagecomputer.programming_languageEclipse2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
researchProduct

Discovering temporal relationships in databases of newspapers

1998

This paper is mainly dedicated to analyse the problem of discovering frequent temporal patterns in event sequences extracted from a large repository of newspapers. The proposed formalism and algorithms rely on Toodor, which is a document retrieval system that allows users to specify conditions over the structure, contents and temporal features of the stored documents. We develop in this work several algorithms for recognising frequent temporal patterns in terms of arc-consistency, which consist of discarding temporal occurrences that do not satisfy a temporal structure.

Formalism (philosophy of mathematics)Information retrievalComputer scienceInformation processingData miningDocument retrievalConstraint satisfactionQuery languagecomputer.software_genrecomputerNewspaper
researchProduct