Support Vector Machines for Face Authentication

Size: px
Start display at page:

Download "Support Vector Machines for Face Authentication"

Transcription

1 Suort Vector Machines for Face Authentication K Jonsson 1 2, J Kittler 1,YPLi 1 and J Matas CVSSP, University of Surrey Guildford, Surrey GU2 5XH, United Kingdom 2 CMP, Czech Technical University Prague, Czech Reublic Abstract The aer studies Suort Vector Machines (SVMs) in the context of face authentication. Our study suorts the hyothesis that the SVM aroach is able to extract the relevant discriminatory information from the training data. We believe this is the main reason for its suerior erformance over benchmark methods. When the reresentation sace already catures and emhasises the discriminatory information content as in the case of Fisherfaces, SVMs loose their sueriority. SVMs can also coe with illumination changes, rovided these are adequately reresented in the training data. However, on data which has been sanitised by feature extraction (Fisherfaces) and/or normalisation, SVMs can get over-trained, resulting in the loss of the ability to generalise. SVMs involve many arameters and can emloy different kernels. This makes the otimisation sace rather extensive, without the guarantee that it has been fully exlored to find the best solution. 1 Introduction Verification of erson identity based on biometric information is imortant for many security alications. Examles include access control to buildings, surveillance and intrusion detection. Furthermore, there are many emerging fields that would benefit from develoments in erson verification technology such as advanced human-comuter interfaces and tele-services including tele-shoing and tele-banking. Comaring verification to recognition there are several asects which differ. First, a client an authorised user of a ersonal identification system is assumed to be co-oerative and makes an identity claim. Comutationally this means that it is not necessary to consult the comlete set of database images (denoted model images below) in order to verify a claim. An incoming image (referred to as a robe image) is thus comared to a small number of model images of the erson whose identity is claimed and not, as in the recognition scenario, with every image (or some descritor of an image) in a otentially large database. Second, an automatic authentication system must oerate in near-real time to be accetable to users. Finally, in recognition exeriments, only images of eole from the training database are resented to the system, whereas the case of an imoster (most likely a reviously unseen erson) is of utmost imortance for authentication. 543 BMVC 1999 doi: /c.13.54

2 The field of face recognition is well established and a large number of algorithms have been roosed in the literature. Poular aroaches include the ones based on deformable temlates [10], dynamic link matching [4], and Eigenfaces [9]. These techniques vary in comlexity and erformance and the choice of algorithm is tyically deendent on the secific alication. The verification roblem, on the other hand, is less exlored. Recent examles include [3] in which a robust form of correlation is alied to face authentication. The aim of the aer is to evaluate the effectiveness of the SVM aroach to face authentication. An earlier study of SVMs in face verification has been reorted by Phillis [8]. An SVM verification system design was comared with a standard Princial Comonent Analysis (PCA) face authentication method and the former was found to be significantly better. In this aroach the SVM was trained to distinguish between the oulations of within-client and between-client difference images resectively, as originally roosed by Moghaddam [7]. This method gives client non-secific suort vectors. In our aroach we adot a client-secific solution which requires learning clientsecific suort vectors. However, this is not the main distinguishing feature of our work: it only reflects our focus on authentication as oosed to recognition which is of concern in [8]. Our rimary motivation for carrying out a similar study was to establish why the erformance of the SVM aroach is suerior. We want to investigate the inherent otential of SVMs to extract the relevant discriminatory information from the training data irresective of reresentation and rerocessing. In order to achieve this objective we have designed exeriments in which faces are reresented in both Princial Comonent (PC) and Linear Discriminant (LD) subsaces. The latter basis (Fisherfaces) is used as an examle of a face reresentation with focus on discriminatory feature extraction while the former achieves simly data comression. We also study the effect of image hotometric normalisation on the erformance of the SVM method. A number of criteria have been considered as a basis for the SVM aroach evaluation, using other baseline techniques as a benchmark. We have included as benchmark verification methods not only the classical PC variants with the L 2 norm and correlation coefficient resectively, but also the LD sace with the same two decision schemes. As criteria for evaluating SVMs in relation to the benchmark methods we have concentrated on the following: comutational comlexity (training mode and routine verification mode), robustness (sensitivity to inut data conditioning), ability to extract discriminatory information, the merits of nonlinear boundaries. The last three criteria are exressed quantitatively in terms of the false client rejection and imostor accetance rates. The findings of our study strongly suort the hyothesis that the SVM aroach is owerful in the sense of being able to extract the relevant discriminatory information from the training data. This is the main reason for the large difference between the observed erformance of the classical Eigenface classification methods and SVMs (factor of almost 3). When the reresentation sace already catures and emhasises the discriminatory information content as in the case of LD bases, SVMs cease to be suerior to the simle Euclidean distance or correlation decision rules. SVMs also show a suerior caability to coe with illumination changes, rovided these are adequately reresented in the training data. However, on data which has been sanitised by feature extraction (Fisherfaces) and/or normalisation, SVMs can get overtrained, resulting in the loss of the ability to generalise. SVMs involve many arameters and can emloy different kernels. This makes the otimisation sace rather extensive, 544

3 without the guarantee that it has been fully exlored to find the best solution. The aer is organised as follows. In the next section we introduce the two face reresentation saces used in our study, namely Eigenfaces and Fisherfaces. In Section 2 we overview the SVM aroach to face identity verification and summarise the benchmark classification methods. Section 3 introduces the face database used in exerimentation and describes the exeriments carried out, their objectives and the results obtained. The results are discussed in Section 4 and conclusions are drawn in Section 5. 2 Face Authentication Any authentication rocess involves two basic comutational stages. In the first stage a suitable reresentation is derived with the multile objective of making the subsequent, decision-making stage, comutationally feasible, immune to environmental changes during the biometric data acquisition, and effective by roviding it only with information which is ertinent to the authentication task. The urose of the second stage is to accet or reject the identity claim corresonding to a robe biometric measurement. This is basically a two-class attern recognition roblem. In the following subsections we introduce the methods adoted for the design of each of these two stages in the context of the face authentication study ursued in this aer. 2.1 Reresentation of Faces The first ste in the face reresentation rocess involves image re-rocessing in order to establish corresondence between face images to be comared. Once an image is registered, it can further be normalised hotometrically. In our study we set out to investigate the resilience of different decision making methods to varying illumination and thus this ste was alied only in a subset of exeriments. In the final ste of rocessing, the image is rojected into a coordinate system which facilitates the decision making rocess comutationally and ossibly emhasises the imortant attributes for face verification. Geometric Normalisation. As the focus of the aer is on the decision making asects of face authentication we have tried to eliminate the deendency of our exeriments on rocesses which may lack robustness. For this reason we have erformed face registration semi-automatically. The rocedure is based on manually localised eye ositions. Four arameters comuted from the eye coordinates (rotation, scaling and translation in the horisontal and vertical directions) are used to cro the face art from the original image and scale it to any desired resolution. Photometric Normalisation. When alied, the hotometric normalisation consisted of removing the mean of the geometrically normalised image and scaling the ixel values by their standard deviation, estimated over the whole croed image. Image Projection. Suose that we have c clients and M training face images x i i = 1 ::: M, x i 2 R D each belonging to one of the client classes fc1 C2 ::: C c g.then we can define the following second-order statistics: 545

4 Between-class scatter matrix: cx S B = 1 ( k ; )( k ; ) T (1) c k=1 Within-class scatter matrix: S W = 1 M cx X (x i ; k )(x i ; k ) k=1 ijx i2ck T (2) Total scatter matrix: S T = S W + S B (3) where is the grand mean and k is the mean of class C k. The aim of the Princial Comonent Analysis is to identify the subsace of the image sace sanned by the training face image data and to decorrelate the ixel values. This can be achieved by finding the eigenvectors W ca of matrix S T associated with nonzero eigenvalues by solving S T W ca ; W ca =0 (4) These eigenvectors are referred to as Eigenfaces. The classical reresentation of a face image is obtained by rojecting it to the coordinate system defined by the Eigenfaces. The rojection of face images into the Princial Comonent (Eigenface) subsace achieves information comression, decorrelation and dimensionality reduction to facilitate decision making. If one is also interested in identifying imortant attributes (features) for face authentication, one can adot a feature extraction maing. A oular technique is to find the Fisher linear discriminants (Fisherfaces) by solving S B W lda ; S W W lda =0 (5) The rojection of a face image into the system of Fisherfaces associated with nonzero eigenvalues will yield a reresentation which will emhasise the discriminatory content of the image. The solution of the generalised eigenvalue roblem in Equation 5 is known, but due to the high dimensionality many standard methods fail and the choice of a stable numerical algorithm is non-trivial [5]. Figure 1 shows the first few PC and LD basis images. In Section 3, we erform exeriments with different number of basis vectors taken from either the Eigenface or Fisherface systems. In the following, for the sake of notational simlicity, we shall not distinguish between the two different basis systems, nor shall we exlicitly denote the dimensionality of the reresentation sace. The actual reresentation used will be clear from the exeriment descrition. Thus in general, in each exeriment we shall work with some transformation matrix W. A samle face image y will then be reresented by a rojection x obtained as x = W T y. Similarly, the client model k will be rojected into a vector! k in the aroriate reresentation sace. 2.2 Classification Suort Vector Machines. The main decision making tool investigated in this aer is the Suort Vector Machine. Below we give a brief resentation of the basic theory. The 546

5 (a) Fisherfaces, unnormalised data (b) Eigenfaces, unnormalised data (c) Eigenfaces, normalised data Figure 1: Basis vectors: Subsace comuted using (a) LDA (unnormalised data) and (b c) PCA (unnormalised and normalised data). In all three cases, the first six basis vectors are shown. reader is referred to [1] for a more comrehensive introduction. SVMs are based on the rincile of structural risk minimisation. The aim is to minimise the uer bound on the exected (or actual) risk defined as 1 Z 1 R() = jz ; f (x )jdp (x z) (6) 2 where is a set of arameters defining the trained machine, z a class label associated with a training samle x, f (x ) a function roviding a maing from training samles to class labels, and P (x z) the unknown robability distribution associating a class label with each training samle. Let l denote the number of training samles and choose some such that 0 1. Then, with robability 1 ;, the following bound on the exected risk holds: r h(log(2l=h) +1); log(=4) R() R em () + (7) l where R em () is the emirical risk as measured on the training set and h is the so called Vanik Chervonenkis (VC) dimension. The second term on the right hand side is called the VC confidence. There are two strategies for minimising the uer bound. The first one is to kee the VC confidence fixed and to minimise the emirical risk and the second one to fix the emirical risk (to a small value) and minimise the VC confidence. The latter aroach is the basis for SVMs and below we will briefly outline this rocedure. First consider the linear searable case. We are looking for the otimal hyerlane in the set of hyerlanes searating the given training samles. This hyerlane minimises the VC confidence and rovides the best generalisation caabilities. Giving a geometric 1 The notation is similar to the one in [1]. 547

6 interretation, the otimal hyerlane maximises the sum of the distances to the closest ositive and negative training samles. This sum is called the margin of the searating hyerlane. It can be shown that the otimal hyerlane w x+b =0(where w is normal to the hyerlane) is obtained by minimising kwk 2 subject to a set of constraints. This is a quadratic otimisation roblem. These concets can be extended to the non-searable and non-linear case. The searability roblem is solved by adding a term to the exression subject to minimisation. This term is the sum of the deviations of the non-searable training samles from the boundary of the margin. This sum is weighted using a arameter controlling the cost of misclassification. The second roblem is how to handle non-linear decision boundaries. This is solved by maing the training samles to a high-dimensional feature sace using kernel functions. In this sace the decision boundary is linear and the techniques outlined above can be directly alied. The kernel functions used in the exeriments reorted in Section 3 are linear, olynomial and radial basis functions (RBFs) defined as K(x i x j ) = x i x j (8) K(x i x j ) = (x i x j +1) d (9) K(x i x j ) = e ;kxi;xjk2 (10) where x i and x j denote two samles. The user-controlled arameters are the degree d in the case of the olynomial and the -value in the case of the RBF kernel. In addition to the SVMs with different kernels we have also imlemented the following standard classification rules as baselines for exerimental comarison. Euclidean Distance. The most commonly used decision rule is based on the Euclidean distance between the samle rojection x and the rojection of the k-th client mean! k, i.e. q d E (x! k )= (x ;! k ) T (x ;! k ) (11) The claimed client identity is acceted if d E (x! k ) is below a threshold Ek. Otherwise it is rejected. Normalised Correlation. Alternatively, the decision can be based on the correlation score d C (x! k )= jxt! k j (12) jxjj! k j In the case of the correlation measure the claimed identity is acceted if d C (x! k ) exceeds a re-secified threshold Ck. Client-Secific Thresholding. The client-secific threshold k can be determined from the receiver oerating characteristic (ROC) comuted on an indeendent evaluation set. The rocedure amounts to generating ROC curves arametrised by secific ercentiles of the imoster distance distributions. Each ercentile defines client-secific offsets. The ROC curves are roduced by measuring the false rejection and false accetance rates for different distance increments measured from these offsets. The ROC curve yielding the minimum equal error rate and the actual increment giving this error jointly define the client secific thresholds. 548

7 3 Exerimental Results BMVC99 The exeriments summarised below were all erformed on frontal-face images from the extended M2VTS multi-modal database [6]. This ublicly available database contains face images and seech recordings of 295 ersons. The subjects were recorded in four searate sessions uniformly distributed over a eriod of 5 months, and within each session a number of shots were taken including both frontal-view and rotation sequences. In the frontal-view sequences the subjects read a secific text (roviding synchronised image and seech data), and in the rotation sequences the head was moved vertically and horizontally (roviding information useful for 3D surface modelling of the head). The exeriments were conducted according to the Laussane evaluation rotocol [6]. This rotocol rovides a unified framework within which the erformance of vision- and seech-based erson authentication systems running on the extended M2VTS database can be measured. The rotocol secifies a artitioning of the database into three disjoint sets: a training set (200 clients), an evaluation set (200 clients and 25 imostors) and a test set (200 clients and 70 imostors). The training set is used to build client models, the evaluation set to get distributions of client and imostor scores used to establish verification thresholds, and the test set to obtain a reliable estimate of the verification rate on indeendent data. 3.1 Results on Face Authentication Exeriments were erformed for the two different reresentations with and without face normalisation, giving four results for each authentication method. The results are summarised in Table 1. Let us first of all look at the baseline methods. One can see that the erformance of both the Euclidean distance and the correlation classifiers imroves monotonically with the data quality (PCs without normalisation, PCs with normalisation, LD without normalisation, LD with normalisation). The Euclidean distance is articularly sensitive to the deviations from the imlicit model underlying the aroach, i.e. client clusters being very comact and roughly sherical. The correlation coefficient can coe better with deviations from the shericity. However, once the data is of that form as in the case of the LD bases with normalised data, the inherent flexibility of this classification method results in a slightly worse erformance than that achieved by the Euclidean distance classifier. The verification erformance as a function of subsace dimensionality for the PCA subsaces using SVMs as classification scheme is shown in Table 2. For both subsaces (unnormalised and normalised), the total error rate dros when the number of coefficients is increased. However, when a certain oint is reached (about 200 coefficients ) the erformance saturates and there is no further imrovement of the verification rates. This series of exeriments shows that the SVMs are robust to changes in the quality of the reresentation and erform well on both under-reresented data (low number of coefficients) and when noise is resent (high number of coefficients). A somewhat surrising result of the exeriments is that the SVMs tend to erform better for lower data quality. In fact Table 1 shows that the erformance is almost without excetion inversely related to data quality. The best results have been obtained for PCs without face normalisation and the worst results for LDs with face normalisation when the authentication roblem becomes relatively easy. This suggests that SVMs can be over- 549

8 SSP CLM NOR KRN PAR Evaluation set Test set EER TE FR FA TE PCA EUD N/A N/A NOC N/A N/A SVM LIN N/A ? EUD NOC SVM POL RBF N/A N/A N/A N/A LIN N/A POL RBF RBF SSP CLM NOR KRN PAR Evaluation set Test set EER TE FR FA TE LDA EUD N/A N/A NOC N/A N/A SVM LIN N/A EUD NOC SVM BMVC99 POL RBF N/A N/A N/A N/A LIN N/A POL RBF Table 1: Verification erformance on the extended M2VTS database: False rejection (FR), false accetance (FA) and total error rate (TE) as functions of subsace (SSP, uer table PCA, lower table LDA), classification method (CLM), hotometric normalisation (NOR) and kernel (KRN, if alicable). The classification methods are Euclidean distance (EUD), normalised correlation (NOC) and suort vector machines (SVM). The kernels are linear (LIN), olynomial (POL) and radial basis functions (RBF). The kernel arameters (PAR) are indicated when alicable (degree for olynomial and for RBF). The row marked with a? was obtained using a different subsace (see text). SSP NoC ERG Evaluation set Test set EER TE FR FA TE UN NO Table 2: Verification erformance as function of PCA subsace dimensionality: False rejection (FR), false accetance (FA) and total error rate (TE) as functions of subsace (SSP) and number of rojection coefficients (NoC). The two subsaces were obtained from unnormalised (UN) and normalised (NO) data. The corresonding ercentage of the energy (ERG) in the subsace is also indicated. All results were obtained using RBF kernel ( =0:01). 550

9 trained on relatively easy data and cannot generalise to new data so readily. This finding has been confirmed by another exeriment where the PC basis system was comuted for normalised face data but without removing the global face mean (row marked with?). In this case the first Eigenface is comletely determined by this global mean face and the successive Eigenfaces are influenced accordingly. For this system of PCs the test set erformance of 5.75% is comarable to the best achieved with the Euclidean distance decision rule (5.68%). The following conclusions can be drawn from the study: The SVM aroach is able to extract the relevant discriminatory information from the data fully automatically. It can also coe with illumination changes. The major role in this characteristic is layed by the SVMs ability to learn non-linear decision boundaries. On data which has been sanitised by feature extraction (Fisherfaces) and/or normalisation, SVMs can get over-trained, resulting in the loss of the ability to generalise. SVMs involve many arameters and can emloy different kernels. This makes the otimisation sace rather extensive, without the guarantee that it has been fully exlored to find the best solution. An SVM takes about 5 seconds to train er client (on a Sun Ultra Enterrise 450). This is about an order of magnitude longer than determining client-secific thresholds for the Euclidean and correlation coefficient classifiers. However, from the ractical oint of view the difference is insignificant. 4 Discussion It is interesting to note that the total error rates achieved on the evaluation set by all the SVM methods are very similar. The better results on the test set yielded by some of the techniques suggest that the test set data is easier than the evaluation set data. The differences in the test set erformance are erhas indicative of the different generalisation caabilities of the resective methods. While it is true that the SVMs are designed not to over-train, if the reresentation sace used is excessively tuned to the training data already, the SVM cannot mitigate such an inherent roblem. This could exlain the better test set erformance on a less owerful reresentation afforded in terms of the PC sace. Note also the difference in the information used by the various decision making schemes which can be gleaned from Figure 2. In this figure we show the original of a robe image, its PC reconstruction in Figure 2b, its LD reconstruction in Figure 2c and finally its SVM reconstruction in Figure 2d. The latter two reconstructions have been roduced in an analogical way to the PC reconstruction aroach. The classical Euclidean distance and correlation methods use the standard PCA reconstruction of the robe image shown in Figure 2b. The SVM using the PC coefficients work with a similar source of information but some regions in the image are weighted more heavily. Thus, SVMs seem to be caable of erforming client-deendent feature extraction. The Fisherface reconstruction uses the global mean image as a starting oint. The bright areas indicate the increased weighting alied to some ixels in the image. This weighting is client deendent and is a function of the robe image rojection into the Fisher sace. 551

10 (a) (b) (c) (d) Figure 2: Reconstruction from subsace reresentations: (a) original image, reconstruction using (b) PCA (191 coefficients), (c) LDA (199 coefficients) and (d) SVM (37 coefficients) subsaces. All subsaces were obtained from unnormalised data. 5 Conclusions The aer studied SVMs in the context of face authentication. Our study roved the hyothesis that the SVM aroach is able to extract the relevant discriminatory information from the training data. This is the main reason for the large difference between the observed erformance of the classical Eigenface classification methods used as a benchmark and SVMs (factor of almost 3). When the reresentation sace already catures and emhasises the discriminatory information content as in the case of LD bases, SVMs cease to be suerior to the simle Euclidean distance or correlation decision rules. SVMs also show a suerior caability to coe with illumination changes, rovided these are adequately reresented in the training data. However, on data which has been sanitised by feature extraction (Fisherfaces) and/or normalisation, SVMs can get overtrained, resulting in the loss of the ability to generalise. SVMs involve many arameters and can emloy different kernels. This makes the otimisation sace rather extensive, without the guarantee that it has been fully exlored to find the best solution. Acknowledgements The research reorted in this aer was carried out within the framework of the Euroean Union ACTS roject M2VTS and ESPRIT RETINA. We would also like to acknowledge Thorsten Joachims at the University of Dortmund for making the SVM Light rogram [2] available to the research community. References [1] C. J. C. Burges. A tutorial on suort vector machines for attern recognition. Data Mining and Knowledge Discovery, 2(2): , [2] T. Joachims. Making large-scale SVM learning ractical. In B. Schölkof, C. J. C. Burges, and A. J. Smola, editors, Advances in Kernel Methods: Suort Vector Learning, ages 41 56, Cambridge, USA, MIT Press. 552

11 [3] K. Jonsson, J. Matas, and J. Kittler. Learning salient features for real-time face verification. In S. Akunuri and C. Kullman, editors, Audio- and Video-Based Biometric Person Authentication, Washington D. C., March 1999, ages 60 65, [4] M. Lades, J. C. Vorbrüggen, J. Buhmann, J. Lange, C. v.d. Malsburg, R. P. Würtz, and W. Konen. Distortion invariant object recognition in the dynamic link architecture. IEEE Transactions on Comuters, 42(3): , Mar [5] Y P Li, J Kittler, and J Matas. Effective imlementation of linear discriminant analysis for face recognition and verification. In A. Leonardis and F. Solina, editors, Comuter Analysis of Images and Patterns, Ljubljana, Slovenia, Set, to aear. [6] K. Messer, J. Matas, J. Kittler, J. Luettin, and G. Maitre. XM2VTSDB: The extended M2VTS database. In S. Akunuri and C. Kullman, editors, Audio- and Video- Based Biometric Person Authentication, Washington D. C., March 1999, ages 72 77, [7] B. Moghaddam, W. Wahid, and A. Pentland. Beyond eigenfaces: Probabilistic matching for face recognition. In Automatic Face and Gesture Recognition, Nara, Jaan, Aril 1998, ages 30 35, [8] P. J. Phillis. Suort vector machines alied to face recognition. In M. S. Kearns, S. A. Solla, and D. A. Cohn, editors, Advances in Neural Information Processing Systems 11, [9] M. A. Turk and A. P. Pentland. Eigenfaces for recognition. Journal of Cognitive Neuroscience, 3(1):71 86, [10] A. L. Yuille. Deformable temlates for face recognition. Journal of Cognitive Neuroscience, 3(1):59 70,

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine Journal of Comuter Science 8 (7): 1184-1190, 2012 ISSN 1549-3636 2012 Science Publications Detection of Occluded Face Image using Mean Based Weight Matrix and Suort Vector Machine 1 G. Nirmala Priya and

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,

More information

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer

More information

Building Better Nurse Scheduling Algorithms

Building Better Nurse Scheduling Algorithms Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham

More information

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Qi Tian, Baback Moghaddam 2 and Thomas S. Huang Beckman Institute, University of Illinois, Urbana-Chamaign, IL 680,

More information

Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments

Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments Proceedings of 0 4th International Conference on Machine Learning and Comuting IPCSIT vol. 5 (0) (0) IACSIT Press, Singaore Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Selecting Discriminative Binary Patterns for a Local Feature

Selecting Discriminative Binary Patterns for a Local Feature BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 3 Sofia 015 rint ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-015-0044 Selecting Discriminative Binary atterns

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Improved Image Super-Resolution by Support Vector Regression

Improved Image Super-Resolution by Support Vector Regression Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort

More information

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1 SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin, Mohammad Ali Masnadi-Shirazi 1 1. Shiraz University, Shiraz, Iran,. Sabanci University, Istanbul, Turkey ssamadi@shirazu.ac.ir,

More information

arxiv: v1 [cs.mm] 18 Jan 2016

arxiv: v1 [cs.mm] 18 Jan 2016 Lossless Intra Coding in with 3-ta Filters Saeed R. Alvar a, Fatih Kamisli a a Deartment of Electrical and Electronics Engineering, Middle East Technical University, Turkey arxiv:1601.04473v1 [cs.mm] 18

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

Multi-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case

Multi-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case Multi-robot SLAM with Unknown Initial Corresondence: The Robot Rendezvous Case Xun S. Zhou and Stergios I. Roumeliotis Deartment of Comuter Science & Engineering, University of Minnesota, Minneaolis, MN

More information

Facial Expression Recognition using Image Processing and Neural Network

Facial Expression Recognition using Image Processing and Neural Network Keerti Keshav Kanchi / International Journal of Comuter Science & Engineering Technology (IJCSET) Facial Exression Recognition using Image Processing and eural etwork Keerti Keshav Kanchi PG Student, Deartment

More information

Efficient Sequence Generator Mining and its Application in Classification

Efficient Sequence Generator Mining and its Application in Classification Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,

More information

SKIN CANCER LESION CLASSIFICATION USING LBP BASED HYBRID CLASSIFIER

SKIN CANCER LESION CLASSIFICATION USING LBP BASED HYBRID CLASSIFIER DOI: htt://dx.doi.org/10.26483/ijarcs.v8i7.4469 Volume 8, No. 7, July August 2017 International Journal of Advanced Research in Comuter Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No.

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation

Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Loy Hui Chien and Takafumi Aoki Graduate School of Information Sciences Tohoku University Aoba-yama 5, Sendai, 98-8579, Jaan

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

Robust Real Time Pattern Matching using Bayesian Sequential Hypothesis Testing

Robust Real Time Pattern Matching using Bayesian Sequential Hypothesis Testing Robust Real Time Pattern Matching using Bayesian Sequential Hyothesis Testing Ofir Pele and Michael Werman Abstract This aer describes a method for robust real time attern matching. We first introduce

More information

Ensemble Learning Based on Parametric Triangular Norms

Ensemble Learning Based on Parametric Triangular Norms Send Orders for Rerints to rerints@benthamscience.ae The Oen Automation and Control Systems Journal, 2014, 6, 997-1003 997 Ensemble Learning Based on Parametric Triangular Norms Oen Access Pengtao Jia

More information

Fast Distributed Process Creation with the XMOS XS1 Architecture

Fast Distributed Process Creation with the XMOS XS1 Architecture Communicating Process Architectures 20 P.H. Welch et al. (Eds.) IOS Press, 20 c 20 The authors and IOS Press. All rights reserved. Fast Distributed Process Creation with the XMOS XS Architecture James

More information

Pattern Recognition Letters

Pattern Recognition Letters Pattern Recognition Letters 30 (2009) 114 122 Contents lists available at ScienceDirect Pattern Recognition Letters journal homeage: www.elsevier.com/locate/atrec A stroke filter and its alication to text

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Face Recognition with Local Binary Patterns

Face Recognition with Local Binary Patterns Face Recognition with Local Binary Patterns Ammad Ali, Shah Hussain, Farah Haroon, Sajid Hussain and M. Farhan Khan Abstract- This aer is about roviding efficient face recognition i.e. feature extraction

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Statistical Detection for Network Flooding Attacks

Statistical Detection for Network Flooding Attacks Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet

More information

Process and Measurement System Capability Analysis

Process and Measurement System Capability Analysis Process and Measurement System aability Analysis Process caability is the uniformity of the rocess. Variability is a measure of the uniformity of outut. Assume that a rocess involves a quality characteristic

More information

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. An Interactive Programming Method for Solving the Multile Criteria Problem Author(s): Stanley Zionts and Jyrki Wallenius Source: Management Science, Vol. 22, No. 6 (Feb., 1976),. 652-663 Published by:

More information

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse

More information

Analyzing Borders Between Partially Contradicting Fuzzy Classification Rules

Analyzing Borders Between Partially Contradicting Fuzzy Classification Rules Analyzing Borders Between Partially Contradicting Fuzzy Classification Rules Andreas Nürnberger, Aljoscha Klose, Rudolf Kruse University of Magdeburg, Faculty of Comuter Science 39106 Magdeburg, Germany

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

Depth Estimation for 2D to 3D Football Video Conversion

Depth Estimation for 2D to 3D Football Video Conversion International Research Journal of Alied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 6 (4): 475-480 Science Exlorer ublications Deth Estimation for 2D to 3D Football

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ Imrove Precategorized Collection Retrieval by Using Suervised Term Weighting Schemes Λ Ying Zhao and George Karyis University of Minnesota, Deartment of Comuter Science Minneaolis, MN 55455 Abstract The

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

Variability-Aware Parametric Yield Estimation for Analog/Mixed-Signal Circuits: Concepts, Algorithms and Challenges

Variability-Aware Parametric Yield Estimation for Analog/Mixed-Signal Circuits: Concepts, Algorithms and Challenges Variability-Aware Parametric Yield Estimation for Analog/Mixed-Signal Circuits: Concets, Algorithms and Challenges Fang Gong Cadence Design Systems, Inc. 2655 Seely Ave., San Jose, CA fgong@cadence.com

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Semi-Supervised Learning Based Object Detection in Aerial Imagery

Semi-Supervised Learning Based Object Detection in Aerial Imagery Semi-Suervised Learning Based Obect Detection in Aerial Imagery Jian Yao Zhongfei (Mark) Zhang Deartment of Comuter Science, State University of ew York at Binghamton, Y 13905, USA yao@binghamton.edu Zhongfei@cs.binghamton.edu

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique Parametric Otimization in WEDM of WC-Co Comosite by Neuro-Genetic Technique P. Saha*, P. Saha, and S. K. Pal Abstract The resent work does a multi-objective otimization in wire electro-discharge machining

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION 466 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 2 NO 5 MAY 999 Short Paers Symmetry Detection by Generalized Comlex (GC) Moments: A Close-Form Solution Dinggang Shen Horace HS I

More information

Blind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution

Blind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution Sensors & Transducers, Vol. 63, Issue, January 204,. 90-95 Sensors & Transducers 204 by IFSA Publishing, S. L. htt://www.sensorsortal.com lind Searation of Permuted Alias Image ase on Four-hase-difference

More information

Real-time Character Posing Using Millions of Natural Human Poses

Real-time Character Posing Using Millions of Natural Human Poses Real-time Character Posing Using Millions of Natural Human Poses Xiaolin K. Wei and Jinxiang Chai Texas A&M University Abstract We resent intuitive interfaces for interactively osing 3D human characters.

More information

Object and Native Code Thread Mobility Among Heterogeneous Computers

Object and Native Code Thread Mobility Among Heterogeneous Computers Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

High Quality Offset Printing An Evolutionary Approach

High Quality Offset Printing An Evolutionary Approach High Quality Offset Printing An Evolutionary Aroach Ralf Joost Institute of Alied Microelectronics and omuter Engineering University of Rostock Rostock, 18051, Germany +49 381 498 7272 ralf.joost@uni-rostock.de

More information

An integrated system for virtual scene rendering, stereo reconstruction, and accuracy estimation.

An integrated system for virtual scene rendering, stereo reconstruction, and accuracy estimation. An integrated system for virtual scene rendering, stereo reconstruction, and accuracy estimation. Marichal-Hernández J.G., Pérez Nava F*., osa F., estreo., odríguez-amos J.M. Universidad de La Laguna,

More information

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling *

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling * ivot Selection for Dimension Reduction Using Annealing by Increasing Resamling * Yasunobu Imamura 1, Naoya Higuchi 1, Tetsuji Kuboyama 2, Kouichi Hirata 1 and Takeshi Shinohara 1 1 Kyushu Institute of

More information

SEMI-AUTOMATIC ROAD EXTRACTION FROM HIGH-RESOLUTION SATELLITE IMAGE

SEMI-AUTOMATIC ROAD EXTRACTION FROM HIGH-RESOLUTION SATELLITE IMAGE SEMI-AUOMAIC ROAD EXRACION FROM HIGH-RESOLUION SAELLIE IMAGE Commission III KEY WORDS: Road Extraction, High-Resolution Satellite Image, Urban area, Semi-automatic ABSRAC: In this research, a method is

More information

High Quality Offset Printing An Evolutionary Approach

High Quality Offset Printing An Evolutionary Approach High Quality Offset Printing An Evolutionary Aroach Ralf Joost Institute of Alied Microelectronics and omuter Engineering University of Rostock Rostock, 18051, Germany +49 381 498 7272 ralf.joost@uni-rostock.de

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

A STUDY ON CALIBRATION OF DIGITAL CAMERA

A STUDY ON CALIBRATION OF DIGITAL CAMERA A STUDY ON CALIBRATION OF DIGITAL CAMERA Ryuji Matsuoka a, *, Kiyonari Fukue a, Kohei Cho a, Haruhisa Shimoda a, Yoshiaki Matsumae a, Kenji Hongo b, Seiju Fujiwara b a Tokai University Research & Information

More information

Saliency-Based Robust Correlation for Real-Time Face Registration and Verification Λ

Saliency-Based Robust Correlation for Real-Time Face Registration and Verification Λ Saliency-Based Robust Correlation for Real-Time Face Registration and Verification Λ K. Jonsson, J. Matas, J. Kittler and S. Haberl Centre for Vision, Speech and Signal Processing University of Surrey

More information

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,

More information

A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification

A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-302, -ISSN: 2278-879, Volume 2, Issue 9 (Setember 202), PP 36-44 A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification A.Kavitha,

More information