![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Electoral manipulation via influence: probabilistic model
We consider a natural generalization of the fundamental electoral manipulation problem, where a briber can change the opinion or preference of voters through influence. This is motivated by modern political ca...
-
Chapter and Conference Paper
A Method for Data Exchange and Management in the Military Industry Field
With the ongoing integration of industrialization and informatization, enterprise information infrastructure has been steadily advancing, leading to a substantial surge in data volume generated within organiza...
-
Chapter and Conference Paper
Focal and Global Spatial-Temporal Transformer for Skeleton-Based Action Recognition
Despite great progress achieved by transformer in various vision tasks, it is still underexplored for skeleton-based action recognition with only a few attempts. Besides, these methods directly calculate the p...
-
Article
FT-HID: a large-scale RGB-D dataset for first- and third-person human interaction analysis
Analysis of human interaction is one important research topic of human motion analysis. It has been studied either using first-person vision (FPV) or third-person vision (TPV). However, the joint learning of b...
-
Chapter and Conference Paper
Research on Image Segmentation Algorithm Based on Level Set
Digital image processing has garnered significant attention and extensive research in both civilian and military domains. Image segmentation serves as a fundamental component of image processing, directly infl...
-
Chapter and Conference Paper
Hardness and Algorithms for Electoral Manipulation Under Media Influence
In this paper, we study a generalization of the classic bribery problem known as electoral manipulation under media influence (EMMI). This model is motivated by modern political campaigns where candidates try ...
-
Article
Transformer guided geometry model for flow-based unsupervised visual odometry
Existing unsupervised visual odometry (VO) methods either match pairwise images or integrate the temporal information using recurrent neural networks over a long sequence of images. They are either not accurat...
-
Article
A Review of Dynamic Maps for 3D Human Motion Recognition Using ConvNets and Its Improvement
RGB-D based action recognition is attracting more and more attention in both the research and industrial communities. However, due to the lack of training data, pre-training based methods are popular in this f...
-
Article
MDSSD: multi-scale deconvolutional single shot detector for small objects
-
Chapter and Conference Paper
KCRS: A Blockchain-Based Key Compromise Resilient Signature System
Digital signatures are widely used to assure authenticity and integrity of messages (including blockchain transactions). This assurance is based on assumption that the private signing key is kept secret, whic...
-
Chapter and Conference Paper
Computational Complexity Characterization of Protecting Elections from Bribery
The bribery problem in election has received considerable attention in the literature, upon which various algorithmic and complexity results have been obtained. It is thus natural to ask whether we can protect...
-
Chapter and Conference Paper
The Game Among Bribers in a Smart Contract System
Blockchain has been used to build various applications, and the introduction of smart contracts further extends its impacts. Most of existing works consider the positive usage of smart contracts but ignore the...
-
Article
CoC: A Unified Distributed Ledger Based Supply Chain Management System
Modern supply chain is a complex system and plays an important role for different sectors under the globalization economic integration background. Supply chain management system is proposed to handle the incre...
-
Chapter and Conference Paper
Dual Long Short-Term Memory Networks for Sub-Character Representation Learning
Characters have commonly been regarded as the minimal processing unit in Natural Language Processing (NLP). But many non-latin languages have hieroglyphic writing systems, involving a big alphabet with thousan...
-
Chapter and Conference Paper
Decentralized Execution of Smart Contracts: Agent Model Perspective and Its Implications
Smart contracts are one of the most important applications of the blockchain. Most existing smart contract systems assume that for executing contract over a network of decentralized nodes, the outcome in accor...
-
Chapter and Conference Paper
On Security Analysis of Proof-of-Elapsed-Time (PoET)
As more applications are built on top of blockchain and public ledger, different approaches are developed to improve the performance of blockchain construction. Recently Intel proposed a new concept of proof-o...
-
Article
A novel rate control algorithm for video coding based on fuzzy-PID controller
Rate control algorithms (RCAs) aim to achieve the best visual quality under the minimum bit rate and the limited buffer size. A self-parameter-tuning fuzzy-PID controller is proposed to reduce the deviation be...
-
Chapter and Conference Paper
Eye Contact Conditioning in Autistic Children Using Virtual Reality Technology
Children afflicted with developmental disabilities, namely autism, suffer from a natural aversion to dyadic (i.e., eye-to-eye) contact. Research has shown this aversion to be an early indicator of slower devel...