Filters








90 Hits in 11.9 sec

Replay Detection and Multi-stream Synchronization in CS: GO Game Streams Using Content-Based Image Retrieval and Image Signature Matching

Van-Tu Ninh, Tu-Khiem Le, Duc-Tien Dang-Nguyen, Cathal Gurrin
2019 MediaEval Benchmarking Initiative for Multimedia Evaluation  
In detail, we use the Bag of Visual Words approach to detect the logo-transitional endpoints, which contains multiple replays in between, then employ an Image Signature Matching algorithm for multi-stream  ...  In GameStory: The 2019 Video Game Analytics Challenge, two main tasks are nominated to solve in the challenge, which are replay detection -multi-stream synchronization, and game story summarization.  ...  ACKNOWLEDGMENTS This publication has emanated from research supported by Science Foundation Ireland under grant numbers SFI/12/RC2289 and 13/RC/2106.  ... 
dblp:conf/mediaeval/NinhLDG19 fatcat:5wi7nrbjfndy3nvyk6okr2v7iy

Radio resource management across multiple protocol layers in satellite networks: a tutorial overview

Paolo Barsocchi, Nedo Celandroni, Franco Davoli, Erina Ferro, Giovanni Giambene, Francisco Javier González Castaño, Alberto Gotta, Jose Ignacio Moreno, Petia Todorova
2005 International Journal of Satellite Communications And Networking  
At the physical link level, most of the games have already been done, in the sense that, optimised or not, a stream of bits must be transmitted over a satellite link, which is often affected by signal  ...  The performance of protocols with acknowledgements and a time-out-based congestion control mechanism, e.g., TCP, is inherently related to the delay-bandwidth product of the connection.  ...  CDMA The signals are encoded, so that information from an individual transmitter can be detected and recovered only by a properly synchronized receiving station that knows the code being used ("signature  ... 
doi:10.1002/sat.820 fatcat:lqvugiz2qraoxmt6afiozk7gr4

6G Technology Overview - One6G White Paper [article]

One6G Association
2022 Zenodo  
After that, we describe the technology in detail, outline the key problems and difficulties, and give a comprehensive overview of the state of the art in that technology. 6G is, however, not limited to  ...  6G is supposed to address the demands for consumption of mobile networking services in 2030 and beyond.  ...  Sensing takes many forms, ranging from detecting the presence of an object to its position, speed, and specific micro-Doppler signature, up to imaging of an environment.  ... 
doi:10.5281/zenodo.6630705 fatcat:rghtxgovubc5zartbe2qx4ekvm

Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice [article]

Quanyan Zhu, Stefan Rass, Bernhard Dieber, Victor Mayoral Vilches
2021 arXiv   pre-print
A powerful quantitative approach to model-based security is offered by game theory, providing a rich spectrum of techniques to optimize security against various kinds of attacks.  ...  Such a multi-perspective view on security is necessary to address the heterogeneity and complexity of robotic systems.  ...  We thank many of our friends and colleagues for their inputs and suggestions.  ... 
arXiv:2103.05789v4 fatcat:p3inkof6kbh3rds6jigvmq4doe

Privacy Management of Multi User Environment in Online Social Networks (OSNs)

P. Amrutha
2013 IOSR Journal of Computer Engineering  
These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised.  ...  Besides we also implement a proof-of-concept prototype which is called as MController (multi controller) having contributor, stakeholder and disseminator controllers along with owner controller.  ...  Leena Ragha, Head of the Department of Computer Engineering, Ramrao Adik Institute of Technology and Prof.  ... 
doi:10.9790/0661-1320107 fatcat:rdpsdcqelbbzvkg5rm4og4tzba

ijair-volume-6-issue-1-vii-january-march-2019 -HINDUSTAN BOOK.pdf

V. Thamilarasi
2022 figshare.com  
This paper experiments various basic image segmentation techniques for Lung Chest X-Ray images  ...  Image retrieval is the quick increasing and demanding research part with regard to both still and moving images [16] . content-based image retrieval (CBIR) was introduced in the early 1980s In Content-based  ...  Canny Edge Detector The Canny edge detection operator was developed by John F. Canny in 1986 and uses a multi-stage algorithm to detect a wide range of edges in images.  ... 
doi:10.6084/m9.figshare.20217722.v1 fatcat:l74ihuqhcvdtjomod3zdwzfniu

Citation analysis of database publications

Erhard Rahm, Andreas Thor
2005 SIGMOD record  
Gerhard serves on the editorial boards of ACM TODS and IEEE CS TKDE, and he was the program committee chair for the 2004 SIGMOD conference in Paris.  ...  References [1] Thanks go also to previous doctoral students who helped set the stage and the many master students who made their contributions and life so enjoyable. activities are shaped by the vision  ...  Gaming as a motivation The gaming industry is about to surpass the movie industry in total revenue. One of the fastest growing branches is the one of massive multi-player online games.  ... 
doi:10.1145/1107499.1107505 fatcat:c4evhhw6y5difggghxsvvdqzeu

Java Cryptography

Jonathan Knudsen
1999 EDPACS: The EDP Audit, Control, and Security Newsletter  
It includes thorough discussions of the java.security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even implement your own provider.  ...  First Edition May 1998 ISBN: 1-56592-402-9, 362 pages Java Cryptography teaches you how to write secure programs using Java's cryptographic tools.  ...  array, signature, matches the input data that has been supplied using update().  ... 
doi:10.1201/1079/43250.27.4.19991001/30275.5 fatcat:exerh23znrh4rbwwwfwk3nivry

A Special issue on Multidisciplinary research to promote the applications in Biological sciences

Guest Editor Dr. M. Manikandan
2022 International Journal of Life Science and Pharma Research  
The articles in this issue are led by editors who are experts in the subject and oversee the editorial process for papers.  ...  The potentially advanced special issue focuses on application of principles and problem-solving techniques of information technology in healthcare and agricultural sector.  ...  Acknowledgement The authors express their gratitude towards the host institution and Biozone, Chennai.  ... 
doi:10.22376/ijpbs/ijlpr/sp22/2022.1-154 fatcat:rcydgammlzgodof3kw3fcdgpji

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2019 Budget Estimates

Department Of Defense Comptroller's Office
2018 Zenodo  
To enable in-theater, continuousanalysis and treatment of warfighters, this project seeks to explore diagnostic andtherapeutic approaches, including the use of bacterial predators as therapeuticsagainst  ...  Theprogram uses information, computational modeling, and physical sciences todiscover properties of biological systems that cross multiple scales of biologicalarchitecture and function, from the molecular  ...  Current search technologies have limitations in search query format, retrieved content organization, and infrastructure support.  ... 
doi:10.5281/zenodo.1215599 fatcat:kxduvg6a5nflhf6iilkwnolobu

Portuguese SKA White Book [article]

Domingos Barbosa, Sonia Antón, João Paulo Barraca, Miguel Bergano, Alexandre C. M. Correia, Dalmiro Maia, Valério A. R. M. Ribeiro
2020 arXiv   pre-print
The meeting was very successful in providing a detailed overview of the SKA status, vision and goals and describes most of the Portuguese contributions to science, technology and the related industry aspirations  ...  and Technology Foundation (FCT) with the contribution of Portuguese policy makers and researchers.  ...  ACKNOWLEDGMENTS We warmly thank Francisco Colomer (JIVE -Joint Institute for VLBI in Europe ERIC) and Leonid Gurvitz (JIVE and Astrodynamics and Space Missions, TU Delft) for the full and comprehensive  ... 
arXiv:2005.01140v1 fatcat:gijmylrmvfcj3i7dt3wbsr6vhm

Advances in Electron Microscopy with Deep Learning

Jeffrey Ede
2020 Zenodo  
Philosophy in Physics is typeset for physical printing and binding.  ...  Highlights include a comprehensive review of deep learning in electron microscopy; large new electron microscopy datasets for machine learning, dataset search engines based on variational autoencoders,  ...  Acknowledgements Thanks go to Jeremy Sloan and Martin Lotz for internally reviewing this article.  ... 
doi:10.5281/zenodo.4598227 fatcat:hm2ksetmsvf37adjjefmmbakvq

Advances in Electron Microscopy with Deep Learning

Jeffrey Ede
2020 Zenodo  
Philosophy in Physics is typeset for physical printing and binding.  ...  Highlights include a comprehensive review of deep learning in electron microscopy; large new electron microscopy datasets for machine learning, dataset search engines based on variational autoencoders,  ...  Acknowledgements Thanks go to Jeremy Sloan and Martin Lotz for internally reviewing this article.  ... 
doi:10.5281/zenodo.4591029 fatcat:zn2hvfyupvdwlnvsscdgswayci

Advances in Electron Microscopy with Deep Learning

Jeffrey Ede
2020 Zenodo  
in Physics will be typeset for physical printing and binding.  ...  Highlights include a comprehensive review of deep learning in electron microscopy; large new electron microscopy datasets for machine learning, dataset search engines based on variational autoencoders,  ...  Acknowledgements Thanks go to Jeremy Sloan and Martin Lotz for internally reviewing this article.  ... 
doi:10.5281/zenodo.4399748 fatcat:63ggmnviczg6vlnqugbnrexsgy

Intel SGX Explained [article]

Victor Costan, Srinivas Devadas
2016 IACR Cryptology ePrint Archive  
We use the papers, reference manuals, and tutorial as primary data sources, and only draw on the patents to fill in missing information.  ...  This paper does not reflect the information available in two papers [74, 109] that were published after the first version of this paper.  ...  The base addresses in most segment registers (CS, DS, ES, SS) are ignored. The base addresses in FS and GS are used, in order to support thread-local storage.  ... 
dblp:journals/iacr/CostanD16 fatcat:vzg7uthif5fqfbx5pdz3ocs7va
« Previous Showing results 1 — 15 out of 90 results