Showing 1933–1944 of 2043 results

  • Towards Online Shortest Path Computation

    Towards Online Shortest Path Computation

    0 out of 5
    4,500

    Towards Online Shortest Path Computation   Abstract?Towards Online Shortest Path Computation. The online shortest path problem aims at computing the shortest path based on live traffic circumstances. This is very important in modern car navigation systems as it helps drivers to make sensible decisions. To our best knowledge, there is no efficient system/solution that can…

  • Towards Open-World Person Re-Identification by One-Shot Group-based Verification

    Towards Open-World Person Re-Identification by One-Shot Group-based Verification

    0 out of 5
    4,500

    Towards Open-World Person Re-Identification by One-Shot Group-based Verification Abstract? Towards Open-World Person Re-Identification by One-Shot Group-based Verification. Solving the problem of matching people across non-overlapping multi-camera views, known as person re-identification (re-id), has received increasing interests in computer vision. In a real-world application scenario, a watch-list < gallery set > of a handful of known…

  • Towards Privacy Preserving Publishing of  Set-valued Data on Hybrid Cloud

    Towards Privacy Preserving Publishing of Set-valued Data on Hybrid Cloud

    0 out of 5
    4,500

    Towards Privacy Preserving Publishing of Set-valued Data on Hybrid Cloud Abstract? Towards Privacy Preserving Publishing of Set-valued Data on Hybrid Cloud. Storage as a service has become an important paradigm in cloud computing for its great flexibility and economic savings. However, the development is hampered by data privacy concerns: data owners no longer physically possess…

  • Towards the Scheduling of Access Requests In Cloud Storage

    Towards the Scheduling of Access Requests In Cloud Storage

    0 out of 5
    4,500

    Towards the Scheduling of Access Requests In Cloud Storage Abstract?In recent years, cloud computing has emerged as an enabling technology, in which virtual machine migration and dynamic resource allocation is one of the hot issues. During the migration of virtual machine, access requests from end users coming constantly. So how to schedule these requests to…

  • Tracking Human Under Occlusion Based on Adaptive Multiple Kernels With Projected Gradients

    Tracking Human Under Occlusion Based on Adaptive Multiple Kernels With Projected Gradients

    0 out of 5
    4,500

    Tracking Human Under Occlusion Based on Adaptive Multiple Kernels With Projected Gradients Abstract?Tracking Human Under Occlusion Based on Adaptive Multiple Kernels With Projected Gradients. Kernel based trackers have been proven to be a promising approach for video object tracking. The use of a single kernel often suffers from occlusion since the available visual information is…

  • TRACON: Interference-Aware Schedulingfor Data-Intensive Applicationsin Virtualized Environments

    TRACON: Interference-Aware Schedulingfor Data-Intensive Applicationsin Virtualized Environments

    0 out of 5
    4,500

    TRACON: Interference-Aware Schedulingfor Data-Intensive Applicationsin Virtualized Environments Abstract? TRACON: Interference-Aware Schedulingfor Data-Intensive Applicationsin Virtualized Environments. Large-scale data centers leverage virtualization technology to achieve excellent resource utilization, scalability, and high availability. Ideally, the performance of an application running inside a virtual machine (VM) shall be independent of co-located applications and VMs that share the physical machine….

  • Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs

    Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs

    0 out of 5
    4,500

    Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs Abstract-In the first place, address the problem of preventing the inference of contextual information in event-driven wireless sensor networks (WSNs). The problem is considered under a global eavesdropper who analyzes low-level RF transmission attributes, such as the number of transmitted packets, inter-packet times, and traffic…

  • Traffic Engineering in Software Defined Networks

    Traffic Engineering in Software Defined Networks

    0 out of 5
    4,500

    Traffic Engineering in Software Defined Networks Abstract?Software Defined Networking is a new networking paradigm that separates the network control plane from the packet forwarding plane and provides applications with an abstracted centralized view of the distributed network state. A logically centralized controller that has a global network view is responsible for all the control decisions…

  • Traffic Sign Recognition for Intelligent Vehicle/Driver  Assistance System Using Neural Network on OpenCV

    Traffic Sign Recognition for Intelligent Vehicle/Driver Assistance System Using Neural Network on OpenCV

    0 out of 5
    4,500

    Traffic Sign Recognition for Intelligent Vehicle/Driver Assistance System Using Neural Network on OpenCV Abstract? Traffic Sign Recognition (TSR) is used to regulate traffic signs, warn a driver, and command or prohibit certain actions. A fast real-time and robust automatic traffic sign detection and recognition can support and disburden the driver and significantly increase driving safety…

  • Traffic Signal Detection

    Traffic Signal Detection

    0 out of 5
    4,500

    Traffic Signal Detection Abstract?Traffic Signal Detection. Due to random arrivals of primary user signals, their timing misalignment issue should be considered for spectrum sensing in cognitive radio (CR) systems, such as CR based femtocell networks. To deal with this issue in the literature, two approaches were recommended, including Bayesian and generalized likelihood ratio test (GLRT)…

  • Transactions Briefs Computing Seeds for LFSR-Based Test Generation From Nontest Cubes

    Transactions Briefs Computing Seeds for LFSR-Based Test Generation From Nontest Cubes

    0 out of 5
    5,500

    Transactions Briefs Computing Seeds for LFSR-Based Test Generation From Nontest Cubes Abstract?In test data compression methods that are based on the use of a linear-feedback shift register (LFSR), a seed that produces a test for a target fault is computed based on a test cube for the fault. With a given LFSR, a seed may…

  • Transparent Real-Time Task Scheduling on Temporal Resource Partitions

    Transparent Real-Time Task Scheduling on Temporal Resource Partitions

    0 out of 5
    4,500

    Transparent Real-Time Task Scheduling on Temporal Resource Partitions Abstract? Transparent Real-Time Task Scheduling on Temporal Resource Partitions. The Hierarchical Real-Time Scheduling < Final Year Projects 2016 > technique helps improve overall resource utilization in real-time embedded systems. With HiRTS, a computation resource is divided into a group of temporal resource partitions, each of which accommodates…

End of content

End of content