The proposed method is composed of two main and sequential operations. The first one is a non-parametric patch sampling method used to fill-in missing regions. Rather than filling in missing regions at the original resolution, the inpainting algorithm is applied on a coarse version of the input picture. There are several reasons for performing the […]
A Distributed Optimal Community-Aware Opportunistic Routing (Caor) Algorithm
Mobile social networks (MSNs) are a special kind of delay tolerant network (DTN), in which mobile users move around and communicate with each other via their carried short-distance wireless communication devices. Typical MSNs include pocket switch networks, mobile vehicular networks, mobile sensor networks. As more users exploit portable short-distance wireless communication devices (such as smart […]
The Prevalence Of Craigslist Based (Automobile) Scams
Craigslist is an online platform for classified advertisements. Its impact on local economy is non-negligible. For example, such advertisements reduce housing rental vacancy rates. The success of Craigslist is limited by persistent scams. The possibility of being scammed could prevent transactions from being completed. In economic terms, the expected value of loss due to a […]
The Recursive Loop-Free Alternative (RLFA) method
We present a method to find an alternate path, after a link failure, from a source node to a destination node. Since reconvergence of an Interior Gateway Protocol (IGP) (e.g., OSPF or IS-IS) can take hundreds of milliseconds, there is a need for a method that will find an alternate path in less time than […]
A mobile presence service is an essential component of a social network application
We describe previous researches on presence services, and survey the presence service of existing systems. Well known commercial IM systems leverage some form of centralized clusters to provide presence services. A taxonomy of different features and functions supported by the three most popular IM systems, AIM, Microsoft MSN and Yahoo! Messenger. The authors also provided […]
Random sampling by Proposing negative bootstrap
To automatically create a negative training set for a given concept, the mainstream methods randomly sample a relatively small subset from a large pool of (user-tagged) examples. The pool may consist of web images with free texts or consumer photos with user provided tags. Apart from the obvious fact that random sampling is simple and […]
Multiple Modalities For Improving Search Performance
We briefly group the related works for visual search reranking into two categories: recurrent pattern mining and multimodality fusion. The former assumes the existence of common patterns among relevant documents for reranking. The later predicts or learns the contribution of a modality in search reranking. The rapid development of Web 2.0 technologies has led to […]
Heuristic load balancing Method for improving the task scheduling
SOC is different from the traditional Grid model (including P2P desktop Grid) in the resource consumption manner. Grids generally assume exclusive resource usage to ensure user QoS. The problem of job scheduling in Grids is usually categorized as a multiprocessor scheduling (MPS) problem (a kind of combinatorial optimization problem), which has been proved to be […]
Visual cryptography is a secret sharing scheme
Visual cryptography (VC) is a secret sharing scheme, based on black and white or binary images. Secret images are divided into share images which, on their own, reveal no information of the original secret. Shares may be distributed to various parties so that only by collaborating with an appropriate number of other parties, can the […]
SOCIAL NETWORK ANALYSIS-BASED MOBILE NODE GROUPING
The proposed cooperative packet delivery approach is related to the concept of delay-tolerant networks (DTNs), in this section, we review the related work on delay tolerant and cooperative data transmission in wireless networks. DTNs are characterized by long transmission delay, high error rates, intermittent connectivity, and existence of multiple unreliable links . Vehicular delay tolerant […]
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 6
- Next Page »