搜索结果: 1-15 共查到“知识库 计算机科学技术 Systems”相关记录171条 . 查询时间(0.078 秒)
CLASSIFICATION OF POLE-LIKE OBJECTS USING POINT CLOUDS AND IMAGES CAPTURED BY MOBILE MAPPING SYSTEMS
Mobile Mapping System Point-Cloud Pole-Like Object Machine Learning Convolutional Neural Network
2018/6/4
The vehicle-based mobile mapping system (MMS) is effective for capturing 3D shapes and images of roadside objects. The laser scanner and cameras on the MMS capture point-clouds and sequential digital ...
2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS)
image processing pattern recognition
2016/7/28
The IEEE Eighth International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2016), a continuation of the highly successful BTAS conference series started in 2007, will be held in t...
2016 8th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC 2016)
Human-Machine Systems Cybernetics
2016/7/20
As a continuation of IHMSC 2009 to IHMSC 2015, which were held successfully in Hangzhou, Nanjing, and Nanchang etc., the 8th International Conference on Intelligent Human-Machine Systems and Cyberneti...
Systems of set constraints are a natural formalism for many problems in program analysis. Set constraints are also a generalization of tree automata. We present an algorithm for solving systems of set...
Type Systems for Distributed Data Structures.
Parallel programming languages that let multiple processors access shared data provide a variety of sharing mechanisms and memory models. Understanding a language’s support for data sharing behavior i...
The term soundness originated in mathematical logic: a deductive system is sound with respect to a semantics if it only proves valid arguments. This concept naturally extends to the context of optimiz...
We present a study of all sources of aliasing in over one million lines of C code, identifying in the process the common patterns of aliasing that arise in practice. We find that aliasing has a great ...
A Query Language for Understanding Component Interactions in Production Systems
Query language logs influence correlation production systems
2016/5/24
When something unexpected happens in a large production system,administrators must first perform a search to isolate which components and component interactions are likely to be involved. The system m...
Online Detection of Multi-Component Interactions in Production Systems
management statistical correlation modeling anomalies signal compression
2016/5/24
We present an online, scalable method for inferring the interactions among the components of large production systems.We validate our approach on more than 1.3 billion lines of log files from eight un...
We describe techniques for analyzing data polymorphism in C, and show that understanding data polymorphism is important for statically verifying type casts in the Linux kernel, where our techniques pr...
Decidability of Systems of Set Constraints with Negative Constraints
Decidability Systems Set Constraints Negative Constraints
2016/5/24
Set constraints are relations between sets of terms. They have been used extensively in various applications in program analysis and type inference. Recently, several algorithms for solving general sy...
Sense, Model and Identify the Load Signatures of HVAC Systems in Metro Stations
Sense Model Identify Load Signatures HVAC Systems Metro Stations
2016/1/22
The Heating Ventilation and Air Conditioning(HVAC) systems in subway stations are energy consuming giants,each of which may consume over 10, 000 Kilowatts per day for cooling and ventilation. To save ...
Cost-Aware Compressive Sensing for Networked Sensing Systems
Crowdsensing Compressive Sensing Resource-efficiency
2016/1/22
Compressive Sensing is a technique that can help reduce the sampling rate of sensing tasks. In mobile crowdsensing applications or wireless sensor networks, the resource burden of collecting samples i...
Barriers to Black-Box Constructions of Traitor Tracing Systems
two-party computation Secure Multiparty Computation
2015/12/21
Reducibility between different cryptographic primitives is a fundamental problem in modern
cryptography. As one of the primitives, traitor tracing systems help content distributors recover
the ident...