We propose an NFA-based algorithm called MIN-MAX to support matching of regular expressions (regexp) composed of Character Classes with Constraint Repetitions (CCR). MIN-MAX is well suited for massive parallel processing architectures, such as FPGAs, yet it is effective on any other computing platform. In MIN-MAX, each active CCR engine (to implement one CCR term) evaluates […]
Tractable Reasoning and Efficient Query Answering in Description Logics
The current trend for building an ontology-based data management system (DMS) is to capitalize on efforts made to design a preexisting well-established DMS (a reference system). The method amounts to extracting from the reference DMS a piece of schema relevant to the new application needs—a module—, possibly personalizing it with extra constraints w.r.t. the application […]
Improved binary partition tree construction for hyperspectral images
The optimal exploitation of the information provided by hyperspectral images requires the development of advanced image-processing tools. Hyperspectral imaging enables the characterization of regions based on their spectral properties which provides a rich amount of information. This paper proposes the construction and the processing of a new region-based hierarchical hyperspectral image representation relying on the […]
Learning Horizontal Connections In A Sparse Coding Model Of Natural Images
Image prior models based on sparse and redundant representations are attracting more and more attention in the field of image restoration. The conventional sparsity-based methods enforce sparsity prior on small image patches independently. Unfortunately, these works neglected the contextual information between sparse representations of neighboring image patches . Sparse coding of image patches extracted from […]
Multimedia Search With Pseudo Revelance Feedback
Search reranking is regarded as a common way to boost retrieval precision. The problem nevertheless is not trivial especially when there are multiple features or modalities to be considered for search, which often happens in image and video retrieval. This paper proposes a new reranking algorithm , named circular reranking, that reinforces the mutual exchange of information across […]
Implementing Effective Controls in a Mobile, Agile, Cloud-Enabled Enterprise
security teams that call for security to be “everyone’s responsibility” and “built in, not bolted on” are struggling to protect their businesses in the face of consumerization, mobility, cloud, and agile business environments. This article offers tangible techniques to turn these clichés into reality while considering the cultural and trust barriers that hinder the implementation […]
Content Delivery Networks In Load Balancing For A Distributed Control Law
we face the challenging issue of defining and implementing an effective law for load balancing in Content Delivery Networks (CDNs). We base our proposal on a formal study of a CDN system, carried out through the exploitation of a fluid flow model characterization of the network of servers. Starting from such characterization, we derive and […]
Location Proof Updating System In A Resistance And Toward Privacy Preserving
we propose A Privacy-Preserving Location proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server For The Purpose […]
Social Network Data Anonymization In Protecting Sensitive Labels
Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. Recently, researchers have developed privacy models similar to k-anonymity to prevent node reidentification through structure information. However, even when these privacy models are enforced, an attacker may still be able to infer one’s private […]
Scalable Database-Driven Reverse Dictionary In A Building
we describe the design and implementation of a reverse dictionary. Unlike a traditional forward dictionary,which maps from words to their definitions, a reverse dictionary takes a user input phrase describing the desired concept, and returns a set of candidate words that satisfy the input phrase. This work has significant application not only for the general […]
- « Previous Page
- 1
- …
- 4
- 5
- 6
- 7
- Next Page »