We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. A resource-efficient partial 3D convolution for gesture recognition

    3DCNNs have shown impressive capabilities in extracting spatiotemporal features from videos. However, in practical applications, the numerous...

    Gongzheng Chen, Zhenghong Dong, ... Jijian Hu in Journal of Real-Time Image Processing
    Article 15 July 2024
  2. 3D-Scene-Former: 3D scene generation from a single RGB image using Transformers

    3D scene generation requires complex hardware setups, such as multiple cameras and depth sensors. To address this challenge, there is a need for...

    Jit Chatterjee, Maria Torres Vega in The Visual Computer
    Article 15 July 2024
  3. Cognitive differences in product shape evaluation between real settings and virtual reality: case study of two-wheel electric vehicles

    Product shape evaluation is an important part of new product development. In the shape design stage, design schemes are often presented through...

    Zhengjie Duan, Jiajun Zhou, Fangzhou Gu in Virtual Reality
    Article Open access 15 July 2024
  4. Combinatorial refinement on circulant graphs

    The combinatorial refinement techniques have proven to be an efficient approach to isomorphism testing for particular classes of graphs. If the...

    Laurence Kluge in computational complexity
    Article Open access 15 July 2024
  5. Sublinear Algorithms in T-Interval Dynamic Networks

    We consider standard T - interval dynamic networks , under the synchronous timing model and the broadcast CONGEST model. In a T - interval dynamic network ,...

    Irvan Jahja, Haifeng Yu in Algorithmica
    Article 12 July 2024
  6. Learning to sculpt neural cityscapes

    We introduce a system that learns to sculpt 3D models of massive urban environments. The majority of humans live their lives in urban environments,...

    Jialin Zhu, He Wang, ... Tom Kelly in The Visual Computer
    Article Open access 12 July 2024
  7. M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction

    Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....

    Junyi Tang, Simin An, ... ** Chen in Multimedia Systems
    Article 12 July 2024
  8. A full-detection association tracker with confidence optimization for real-time multi-object tracking

    Multi-object tracking (MOT) aims to obtain trajectories with unique identifiers for multiple objects in a video stream. In current approaches,...

    Youyu Liu, **angxiang Zhou, ... Wanbao Tao in Journal of Real-Time Image Processing
    Article 11 July 2024
  9. ACL-SAR: model agnostic adversarial contrastive learning for robust skeleton-based action recognition

    Human skeleton data have been widely explored in action recognition and the human–computer interface recently, thanks to off-the-shelf motion sensors...

    Jiaxuan Zhu, Ming Shao, ... Siyu **a in The Visual Computer
    Article 11 July 2024
  10. Global adaptive histogram feature network for automatic segmentation of infection regions in CT images

    Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...

    **nren Min, Yang Liu, ... Mingyang Zhong in Multimedia Systems
    Article 11 July 2024
  11. Threshold ring signature: generic construction and logarithmic size instantiation

    A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be...

    Huizhuo Wang, Yang Tao, Rui Zhang in Cybersecurity
    Article Open access 11 July 2024
  12. Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency

    Polynomial commitments schemes are a powerful tool that enables one party to commit to a polynomial p of degree d , and prove that the committed...

    Giacomo Fenzi, Hossein Moghaddas, Ngoc Khanh Nguyen in Journal of Cryptology
    Article Open access 10 July 2024
  13. Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)

    The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...

    Vanessa Tietz, Constantin Frey, ... Bjoern Annighoefer in Innovations in Systems and Software Engineering
    Article Open access 10 July 2024
  14. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  15. Real-time and secure identity authentication transmission mechanism for artificial intelligence generated image content

    The rapid development of generative artificial intelligence technology and large-scale pre-training models has led to the emergence of artificial...

    **ao Feng, Zheng Yuan in Journal of Real-Time Image Processing
    Article 10 July 2024
  16. Intersecting realms: a cross-disciplinary examination of VR quality of experience research

    The advent of virtual reality (VR) technology has necessitated a reevaluation of quality of experience (QoE) models. While numerous recent efforts...

    Aleksandra Zheleva, Lieven De Marez, ... Klaas Bombeke in Virtual Reality
    Article Open access 10 July 2024
  17. The Price of Active Security in Cryptographic Protocols

    We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...

    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Journal of Cryptology
    Article Open access 10 July 2024
  18. Continual few-shot patch-based learning for anime-style colorization

    The automatic colorization of anime line drawings is a challenging problem in production pipelines. Recent advances in deep neural networks have...

    Akinobu Maejima, Seitaro Shinagawa, ... Yasuhiro Mukaigawa in Computational Visual Media
    Article Open access 09 July 2024
  19. Autocleandeepfood: auto-cleaning and data balancing transfer learning for regional gastronomy food computing

    Food computing has emerged as a promising research field, employing artificial intelligence, deep learning, and data science methodologies to enhance...

    Nauman Ullah Gilal, Marwa Qaraqe, ... Marco Agus in The Visual Computer
    Article Open access 09 July 2024
  20. A novel single kernel parallel image encryption scheme based on a chaotic map

    The development of communication technologies has increased concerns about data security, increasing the prominence of cryptography. Images are one...

    Joao Inacio Moreira Bezerra, Alexandre Molter, ... Vinícius Valduga de Almeida Camargo in Journal of Real-Time Image Processing
    Article 09 July 2024
Did you find what you were looking for? Share feedback.