![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Pairwise Negative Sample Mining for Human-Object Interaction Detection
In recent years, Human-Object Interaction (HOI) detection has been riding the wave of the development of object detectors. Typically, one-stage methods exploit them by instantiating HOI and detecting them in a...
-
Chapter and Conference Paper
Accelerating BGV Bootstrap** for Large p Using Null Polynomials over \(\mathbb {Z}_{p^e}\)
The BGV scheme is one of the most popular FHE schemes for computing homomorphic integer arithmetic. The bootstrap** technique of BGV is necessary to evaluate arbitrarily deep circuits homomorphically. Howeve...
-
Chapter and Conference Paper
Medical Image Feature Extraction and Registration Algorithm Based on PCA
In order to improve the accuracy and speed of medical image registration, a PCA based medical image feature extraction and registration algorithm is proposed. Firstly, the original image is trained and the sam...
-
Chapter and Conference Paper
A Privacy-Preserving Lightweight Energy Data Sharing Scheme Based on Blockchain for Smart Grid
As many users join the smart grid system, energy companies need user energy data to manage and improve energy delivery. However, while enjoying the services provided by energy companies, the energy data submit...
-
Chapter and Conference Paper
LQR Optimal Control Method Based on Two-Degree-of Freedom Manipulator
The robotic arm is a very complex multi-input, multi-output nonlinear system, and it needs to have high trajectory tracking accuracy. In this paper, a mathematical modeling and optimal trajectory tracking cont...
-
Chapter and Conference Paper
Temperature Prediction of Medium Frequency Furnace Based on Transformer Model
Aiming at the difficulty of continuous measurement of charge temperature in intermediate frequency furnace smelting process, this paper proposes a method of continuous measurement of charge temperature in inte...
-
Chapter and Conference Paper
An Adaptive Low Illumination Color Image Enhancement Method Using Dragonfly Algorithm
In order to improve the visual perception of color images under low illumination conditions, an adaptive enhancement method is proposed to enhance the contrast and brightness, enrich the color and avoid over-e...
-
Chapter and Conference Paper
SemFlow: Accurate Semantic Identification from Low-Level System Data
Forensic analysis, nowadays, is a crucial part of attack investigation in end-user and enterprise systems. Log collection and analysis enable investigators to rebuild the attack chain, find the attack source a...
-
Chapter and Conference Paper
UDC 2020 Challenge on Image Restoration of Under-Display Camera: Methods and Results
This paper is the report of the first Under-Display Camera (UDC) image restoration challenge in conjunction with the RLQ workshop at ECCV 2020. The challenge is based on a newly-collected database of Under-Dis...
-
Chapter and Conference Paper
A Robust Multi-terminal Support Method Based on Tele-Immersion Multimedia Technology
In this paper, a multi terminal support method based on tele-immersion multimedia technology is proposed. This method provides two functions of synchronous request and asynchronous request, and it can dynamic...
-
Chapter and Conference Paper
An Approach to Propose Optimal Energy Storage System in Real-Time Electricity Pricing Environments
Based on the fact that the penetration of renewable energies is increasing dramatically, almost all the energy markets have changed and taken action to present the strategy of real-time pricing over the last d...
-
Chapter and Conference Paper
A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware
Provenance of system subjects (e.g., processes) and objects (e.g., files) are very useful for many forensics tasks. In our analysis and comparison of existing Linux provenance tracing systems, we found that mo...
-
Chapter and Conference Paper
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter
As a new generation voice service, Voice over LTE (VoLTE) has attracted worldwide attentions in both the academia and industry. Different from the traditional voice call based on circuit-switched (CS), VoLTE e...
-
Chapter and Conference Paper
A Sharing-Memory Based Ring Framework
A single-ring may become performance bottleneck for multi-consumer and multi-producer. Although multi-ring can solve above problems by allocating one ring for each task, it may decrease resource utilization. T...
-
Chapter and Conference Paper
Evaluation and Analysis of Three Typical Resource Allocation Algorithms in Virtual Router Platform
Virtual router is regarded as one of key platforms for the deployment and application of network virtualization technology, which can run multiple router instances in parallel and in independent. However, due ...
-
Chapter and Conference Paper
An Evolving Architecture for Network Virtualization
Network virtualization realizes new possibilities for the evolution way to future network by allowing multiple virtual networks over a shared physical infrastructure. In this paper, we discuss the shortcoming ...
-
Chapter and Conference Paper
A Capability-Based Matchmaking Mechanism Supporting Resource Aggregation within Large-Scale Distributed Computing Infrastructures
Facing the large-scale, heterogeneous dynamic resource and the complex constraints of computation-intensive parallel scientific applications, collaborating large-scale computation resource for these applicatio...
-
Chapter and Conference Paper
Research on an Adaptive Routing Mechanism of Combination of Packet Forward with Virtual Circuit
Virtual circuit transmission mechanism as represented by MPLS has the characteristics of low forwarding overhead and short transmission delay. In contrast, the traditional packet forward mechanism is more flex...
-
Chapter and Conference Paper
An Improved DES Anti-DPA Algorithm and Its Automatic Simulation System
Based on the analysis of DES cryptographic algorithms and anti-attack strategy, this paper proposes an advanced DES anti-DPA attack algorithm by further improving the Mask method in the power consumption point...
-
Chapter and Conference Paper
An Adaptive Slope Compensation Circuit and Its Application
To solve the over-compensation problem in the current mode PWM switch power, a new adaptive slope compensation circuit is proposed in this paper. In the circuit, the difference between the output and input vol...