期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
Coupling ground-level panoramas and aerial imagery for change detection 被引量:2
1
作者 Nehla Ghouaiel Sébastien Lefèvre 《Geo-Spatial Information Science》 SCIE EI CSCD 2016年第3期222-232,共11页
Geographic landscapes in all over the world may be subject to rapid changes induced,for instance,by urban,forest,and agricultural evolutions.Monitoring such kind of changes is usually achieved through remote sensing.H... Geographic landscapes in all over the world may be subject to rapid changes induced,for instance,by urban,forest,and agricultural evolutions.Monitoring such kind of changes is usually achieved through remote sensing.However,obtaining regular and up-to-date aerial or satellite images is found to be a high costly process,thus preventing regular updating of land cover maps.Alternatively,in this paper,we propose a low-cost solution based on the use of groundlevel geo-located landscape panoramic photos providing high spatial resolution information of the scene.Such photos can be acquired from various sources:digital cameras,smartphone,or even web repositories.Furthermore,since the acquisition is performed at the ground level,the users’immediate surroundings,as sensed by a camera device,can provide information at a very high level of precision,enabling to update the land cover type of the geographic area.In the described herein method,we propose to use inverse perspective mapping(inverse warping)to transform the geo-tagged ground-level 360◦photo onto a top-down view as if it had been acquired from a nadiral aerial view.Once re-projected,the warped photo is compared to a previously acquired remotely sensed image using standard techniques such as correlation.Wide differences in orientation,resolution,and geographical extent between the top-down view and the aerial image are addressed through specific processing steps(e.g.registration).Experiments on publicly available data-sets made of both ground-level photos and aerial images show promising results for updating land cover maps with mobile technologies.Finally,the proposed approach contributes to the crowdsourcing efforts in geo-information processing and mapping,providing hints on the evolution of a landscape. 展开更多
关键词 Image analysis remote sensing change detection crowdsourcing mobile mapping panoramic photos
原文传递
GPU的并行支持向量机算法(英文) 被引量:6
2
作者 DO Thanh-Nghi NGUYEN Van-Hoa POULET Franqois 《计算机科学与探索》 CSCD 2009年第4期368-377,共10页
提出了一种新的并行增量式支持向量机算法来解决图形处理单元(GPU)中大规模数据集的分类问题。SVM以及核相关方法可以用来创建精确分类模型,但学习过程需要大量内存和很长时间。扩展了Suykens和Vandewalle提出的最少次方SVM(LS-SVM)方... 提出了一种新的并行增量式支持向量机算法来解决图形处理单元(GPU)中大规模数据集的分类问题。SVM以及核相关方法可以用来创建精确分类模型,但学习过程需要大量内存和很长时间。扩展了Suykens和Vandewalle提出的最少次方SVM(LS-SVM)方法来建立增量和并行算法。新算法使用图形处理器以低代价获得高系统性能。实现表明,在UCI和Delve数据集上,基于GPU并行增量算法较CPU实现方法快130倍,而且比现行算法,如LibSVM、SVM-perf和CB-SVM等快的多(超过2500倍)。 展开更多
关键词 支持向量机 图形处理器 最少次方SVM
在线阅读 下载PDF
High Performance Motion Estimation Operator Using Multimedia Oriented Subword Parallelism
3
作者 Shafqat Khan Emmanuel Casseau 《通讯和计算机(中英文版)》 2012年第1期1-14,共14页
关键词 多媒体应用 并行处理 计算单位 运动估计 性能 资源利用率 经营单位 SWP
在线阅读 下载PDF
Modeling and Analysis of UAV-Assisted Mobile Network with Imperfect Beam Alignment
4
作者 Mohamed Amine Ouamri Reem Alkanhel +2 位作者 Cedric Gueguen Manal Abdullah Alohali Sherif S.M.Ghoneim 《Computers, Materials & Continua》 SCIE EI 2023年第1期453-467,共15页
With the rapid development of emerging 5G and beyond(B5G),Unmanned Aerial Vehicles(UAVs)are increasingly important to improve the performance of dense cellular networks.As a conventional metric,coverage probability ha... With the rapid development of emerging 5G and beyond(B5G),Unmanned Aerial Vehicles(UAVs)are increasingly important to improve the performance of dense cellular networks.As a conventional metric,coverage probability has been widely studied in communication systems due to the increasing density of users and complexity of the heterogeneous environment.In recent years,stochastic geometry has attracted more attention as a mathematical tool for modeling mobile network systems.In this paper,an analytical approach to the coverage probability analysis of UAV-assisted cellular networks with imperfect beam alignment has been proposed.An assumption was considered that all users are distributed according to Poisson Cluster Process(PCP)around base stations,in particular,Thomas Cluster Process(TCP).Using thismodel,the impact of beam alignment errors on the coverage probabilitywas investigated.Initially,the ProbabilityDensity Function(PDF)of directional antenna gain between the user and its serving base station was obtained.Then,association probability with each tier was achieved.A tractable expression was derived for coverage probability in both Line-of-Sight(LoS)andNon-Line-of-Sight(NLoS)condition links.Numerical results demonstrated that at low UAVs altitude,beam alignment errors significantly degrade coverage performance.Moreover,for a small cluster size,alignment errors do not necessarily affect the coverage performance. 展开更多
关键词 Unmanned aerial vehicles coverage analysis stochastic geometry millimeter wave imperfect beam alignment
在线阅读 下载PDF
Towards Specifications for Automatic Recognition Software:An Example of a User-Centred Design
5
作者 Sylvain Fleury Eric Jamet +3 位作者 Emilie Loup-Escande Achraf Ghorbel Aurélie Lemaitre Eric Anquetil 《Journal of Software Engineering and Applications》 2013年第10期1-4,共4页
This article describes a user-centred method used to design innovative pattern recognition software for technical paper documents. This kind of software can make some errors of interpretation. It will therefore be imp... This article describes a user-centred method used to design innovative pattern recognition software for technical paper documents. This kind of software can make some errors of interpretation. It will therefore be important that human operators are able to identify and correct these mistakes. The identification of errors is a difficult task because operators need to establish co-reference between the initial document and it interpretation. Moreover, users must be able to checks the interpretation without forgetting any area. This task requires the interface is easy to use. The experiments showed that the sequential display of interpretation is the most effective and that the interruptions by user reduce task duration. Moreover, queries by the system may improve error detection. This paper summarizes the main results of the research conducted in the context of this design for enhance the interface, and describes the specifications to which it gave rise. 展开更多
关键词 User-Centred Design Interpretation of Document Error Detection
暂未订购
Formal verification of synchronous data-flow program transformations toward certified compilers 被引量:8
6
作者 Van Chan NGO Jean-Pierre TALPIN +2 位作者 Thierry GAUTIER Paul Le GUERNIC Loic BESNARD 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第5期598-616,共19页
Translation validation was invented in the 90's by Pnueli et al. as a technique to formally verify the correctness of code generators. Rather than certifying the code generator or exhaustively qualifying it, translat... Translation validation was invented in the 90's by Pnueli et al. as a technique to formally verify the correctness of code generators. Rather than certifying the code generator or exhaustively qualifying it, translation validators attempt to verify that program transformations preserve semantics. In this work, we adopt this approach to formally verify that the clock semantics and data dependence are preserved during the compilation of the Signal compiler. Translation valida- tion is implemented for every compilation phase from the initial phase until the latest phase where the executable code is generated, by proving the transformation in each phase of the compiler preserves the semantics. We represent the clock semantics, the data dependence of a program and its trans- formed counterpart as first-order formulas which are called clock models and synchronous dependence graphs (SDGs), respectively. We then introduce clock refinement and depen- dence refinement relations which express the preservations of clock semantics and dependence, as a relation on clock mod- els and SDGs, respectively. Our validator does not require any instrumentation or modification of the compiler, nor any rewriting of the source program. 展开更多
关键词 formal verification translation validation certi-fied compiler multi-clocked synchronous programs embed-ded systems.
原文传递
Edge Computing Based Applications in Vehicular Environments:Comparative Study and Main Issues 被引量:4
7
作者 Leo Mendiboure Mohamed-Aymen Chalouf Francine Krief 《Journal of Computer Science & Technology》 SCIE EI CSCD 2019年第4期869-886,共18页
Despite the expanded efforts,the vehicular ad-hoc networks(VANETs)are still facing many challenges such as network performances,network scalability and context-awareness.Many solutions have been proposed to overcome t... Despite the expanded efforts,the vehicular ad-hoc networks(VANETs)are still facing many challenges such as network performances,network scalability and context-awareness.Many solutions have been proposed to overcome these obstacles,and the edge computing,an extension of the cloud computing,is one of them.With edge computing,communication,storage and computational capabilities are brought closer to end users.This could offer many benefits to the global vehicular network including,for example,lower latency,network off-loading and context-awareness(location,environment factors,etc.).Different approaches of edge computing have been developed:mobile edge computing(MEC),fog computing(FC)and cloudlet are the main ones.After introducing the vehicular environment background,this paper aims to study and compare these different technologies.For that purpose their main features are compared and the state-of-the-art applications in VANETs are analyzed.In addition,MEC,FC,and cloudlet are classified and their suitability level is debated for different types of vehicular applications.Finally,some challenges and future research directions in the fields of edge computing and VANETs are discussed. 展开更多
关键词 CLOUD COMPUTING EDGE COMPUTING FOG COMPUTING CLOUDLET vehicular network
原文传递
Exploring system architectures in AADL via POLYCHRONY and SYNDEx 被引量:2
8
作者 Huafeng YU Yue MA +4 位作者 Thierry GAUTIER LoYc BESNARD Jean-Pierre TALPIN Paul Le GUERNIC Yves SOREL 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第5期627-649,共23页
Architecture analysis & design language (AADL) has been increasingly adopted in the design of em- bedded systems, and corresponding scheduling and formal verification have been well studied. However, little work ta... Architecture analysis & design language (AADL) has been increasingly adopted in the design of em- bedded systems, and corresponding scheduling and formal verification have been well studied. However, little work takes code distribution and architecture exploration into ac- count, particularly considering clock constraints, for dis- tributed multi-processor systems. In this paper, we present an overview of our approach to handle these concerns, together with the associated toolchain, AADL-PoLYCHRONY-SYNDEx. First, in order to avoid semantic ambiguities of AADL, the polychronous/multiclock semantics of AADL, based on a polychronous model of computation, is considered. Clock synthesis is then carried out in POLYCHRONY, which bridges the gap between the polychronous semantics and the syn- chronous semantics of SYNDEx. The same timing semantics is always preserved in order to ensure the correctness of the transformations between different formalisms. Code distri- bution and corresponding scheduling is carried out on the obtained SYNDEx model in the last step, which enables the exploration of architectures originally specified in AADL. Our contribution provides a fast yet efficient architecture ex- ploration approach for the design of distributed real-time and embedded systems. An avionic case study is used here to illustrate our approach. 展开更多
关键词 POLYCHRONY SIGNAL AADL SYNDEx architec-ture exploration modeling timing analysis scheduling dis-tribution
原文传递
Polychronous automata and their use for formal validation of AADL models 被引量:1
9
作者 Thierry GAUTIER Clement GUY +3 位作者 Alexandre HONORAT Paul LE GUERNIC Jean-Pierre TALPIN Loic BESNARD 《Frontiers of Computer Science》 SCIE EI CSCD 2019年第4期677-697,共21页
This paper investigates how state diagrams can be best represented in the polychronous model of computation (MoC) and proposes to use this model for code validation of behavior specifications in architecture analysis ... This paper investigates how state diagrams can be best represented in the polychronous model of computation (MoC) and proposes to use this model for code validation of behavior specifications in architecture analysis & design language (AADL). In this relational MoC, the basic objects are signals, which are related through dataflow equations. Signals are associated with logical clocks, which provide the capability to describe systems in which components obey multiple clock rates. We propose a model of finite-state automata, called polychronous automata, which is based on clock relationships. A specificity of this model is that an automaton is submitted to clock constraints, which allows one to specify a wide range of control-related configurations, being either reactive or restrictive with respect to their control environment. A semantic model is defined for these polychronous automata, which relies on boolean algebra of clocks. Based on a previously defined modeling method for AADL software architectures using the polychronous MoC, the proposed model is used as a formal model for the AADL behavior annex. This is illustrated with a case study involving an adaptive cruise control system. 展开更多
关键词 architecture modeling FORMAL SEMANTICS finitestate AUTOMATON polychronous model synchronous CONCURRENCY code generation AADL
原文传递
Conditions for Set Agreement with an Application to Synchronous Systems
10
作者 Francois Bonnet Michel Raynal 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第3期418-433,共16页
The k-set agreement problem is a generalization of the consensus problem: considering a system made up of n processes where each process proposes a value, each non-faulty process has to decide a value such that a dec... The k-set agreement problem is a generalization of the consensus problem: considering a system made up of n processes where each process proposes a value, each non-faulty process has to decide a value such that a decided value is a proposed value, and no more than k different values are decided. While this problem cannot be solved in an asynchronous system prone to t process crashes when t≥ k, it can always be solved in a synchronous system; [t/k]+1 is then a lower bound on the number of rounds (consecutive communication steps) for the non-faulty processes to decide. The condition-based approach has been introduced in the consensus context. Its aim was to both circumvent the consensus impossibility in asynchronous systems, and allow for more efficient consensus algorithms in synchronous systems. This paper addresses the condition-based approach in the context of the k-set agreement problem. It has two main contributions. The first is the definition of a framework that allows defining conditions suited to the l-set agreement problem and the second is a generic synchronous k-set agreement algorithm based on conditions. 展开更多
关键词 agreement problem CONDITION EFFICIENCY lower bound synchronous system
原文传递
Eventual Leader Election with Weak Assumptions on Initial Knowledge,Communication Reliability,and Synchrony
11
作者 Antonio Fernndez Anta Ernesto Jimnez Michel Raynal 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第6期1267-1281,共15页
This paper considers the eventual leader election problem in asynchronous message-passing systems where an arbitrary number t of processes can crash(t〈n,where n is the total number of processes).It considers weak a... This paper considers the eventual leader election problem in asynchronous message-passing systems where an arbitrary number t of processes can crash(t〈n,where n is the total number of processes).It considers weak assumptions both on the initial knowledge of the processes and on the network behavior.More precisely,initially,a process knows only its identity and the fact that the process identities are different and totally ordered(it knows neither n nor t).Two eventual leader election protocols and a lower bound are presented.The first protocol assumes that a process also knows a lower bound α on the number of processes that do not crash.This protocol requires the following behavioral properties from the underlying network:the graph made up of the correct processes and fair lossy links is strongly connected,and there is a correct process connected to(n〈f)-α other correct processes(where f is the actual number of crashes in the considered run) through eventually timely paths(paths made up of correct processes and eventually timely links).This protocol is not communication-efficient in the sense that each correct process has to send messages forever.The second protocol is communication-efficient:after some time,only the final common leader has to send messages forever.This protocol does not require the processes to know α,but requires stronger properties from the underlying network:each pair of correct processes has to be connected by fair lossy links(one in each direction),and there is a correct process whose n〈f-1 output links to the rest of correct processes have to be eventually timely.A matching lower bound result shows that any eventual leader election protocol must have runs with this number of eventually timely links,even if all processes know all the processes identities.In addition to being communication-efficient,the second protocol has another noteworthy efficiency property,namely,be the run finite or infinite,all the local variables and message fields have a finite domain in the run. 展开更多
关键词 eventually timely and fair lossy links eventual leader election failure detector omega leader oracle process initial knowledge
原文传递
Malware Guard Extension:abusing Intel SGX to conceal cache attacks
12
作者 Michael Schwarz Samuel Weiser +2 位作者 Daniel Gruss Clementine Maurice Stefan Mangard 《Cybersecurity》 CSCD 2020年第1期22-41,共20页
In modern computer systems,user processes are isolated from each other by the operating system and the hardware.Additionally,in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants th... In modern computer systems,user processes are isolated from each other by the operating system and the hardware.Additionally,in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical machine.However,the hypervisor does not protect tenants against the cloud provider and thus,the supplied operating system and hardware.Intel SGX provides a mechanism that addresses this scenario.It aims at protecting user-level software from attacks from other processes,the operating system,and even physical attackers.In this paper,we demonstrate fine-grained software-based side-channel attacks from a malicious SGX enclave targeting co-located enclaves.Our attack is the first malware running on real SGX hardware,abusing SGX protection features to conceal itself.Furthermore,we demonstrate our attack both in a native environment and across multiple Docker containers.We perform a Prime+Probe cache side-channel attack on a co-located SGX enclave running an up-to-date RSA implementation that uses a constant-time multiplication primitive.The attack works,although in SGX enclaves,there are no timers,no large pages,no physical addresses,and no shared memory.In a semi-synchronous attack,we extract 96%of an RSA private key from a single trace.We extract the full RSA private key in an automated attack from 11 traces within 5 min. 展开更多
关键词 Intel SGX Side channel Side-channel attack Prime+Probe
原文传递
Malware Guard Extension:abusing Intel SGX to conceal cache attacks
13
作者 Michael Schwarz Samuel Weiser +2 位作者 Daniel Gruss Clementine Maurice Stefan Mangard 《Cybersecurity》 2018年第1期1010-1029,共20页
In modern computer systems,user processes are isolated from each other by the operating system and the hardware.Additionally,in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants th... In modern computer systems,user processes are isolated from each other by the operating system and the hardware.Additionally,in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical machine.However,the hypervisor does not protect tenants against the cloud provider and thus,the supplied operating system and hardware.Intel SGX provides a mechanism that addresses this scenario.It aims at protecting user-level software from attacks from other processes,the operating system,and even physical attackers.In this paper,we demonstrate fine-grained software-based side-channel attacks from a malicious SGX enclave targeting co-located enclaves.Our attack is the first malware running on real SGX hardware,abusing SGX protection features to conceal itself.Furthermore,we demonstrate our attack both in a native environment and across multiple Docker containers.We perform a Prime+Probe cache side-channel attack on a co-located SGX enclave running an up-to-date RSA implementation that uses a constant-time multiplication primitive.The attack works,although in SGX enclaves,there are no timers,no large pages,no physical addresses,and no shared memory.In a semi-synchronous attack,we extract 96% of an RSA private key from a single trace.We extract the full RSA private key in an automated attack from 11 traces within 5 min. 展开更多
关键词 Intel SGX Side channel Side-channel attack Prime+Probe
原文传递
Variance reduction for generalized likelihood ratio method by conditional Monte Carlo and randomized Quasi-Monte Carlo methods
14
作者 Yijie Peng Michael C.Fu +2 位作者 Jiaqiao Hu Pierre L’Ecuyer Bruno Tuffin 《Journal of Management Science and Engineering》 2022年第4期550-577,共28页
The generalized likelihood ratio(GLR)method is a recently introduced gradient estimation method for handling discontinuities in a wide range of sample performances.We put the GLR methods from previous work into a sing... The generalized likelihood ratio(GLR)method is a recently introduced gradient estimation method for handling discontinuities in a wide range of sample performances.We put the GLR methods from previous work into a single framework,simplify regularity conditions to justify the unbiasedness of GLR,and relax some of those conditions that are difficult to verify in practice.Moreover,we combine GLR with conditional Monte Carlo methods and randomized quasi-Monte Carlo methods to reduce the variance.Numerical experiments show that variance reduction could be significant in various applications. 展开更多
关键词 SIMULATION Stochastic gradient estimation Conditional Monte Carlo Randomized quasi-Monte Carlo
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部