Please login to be able to save your searches and receive alerts for new content matching your search criteria.
The Blockchain 2.0 era integrated with smart contract along with its platforms and applications have experienced explosive growth in recent years. However, many smart contracts deployed in practice are prone to errors and cannot be modified due to the ...
Time sensitive networking (TSN) is a new set of Ethernet standards that provide real-time and security for automotive, aerospace and industrial automation applications. Traffic in time sensitive networks has combination, complexity and flexibility. Due ...
The problem that needs to be solved for photorealistic style transfer lies in limiting the distortion of texture details of the generated image based on the typical style transfer network. Although the existing methods achieve better stylization results,...
Block-wise compressive sensing (BCS) uses a fix size sensing matrix to raster-scan the entire image to acquire the signal block by block. Compared with traditional image compressive sensing methods, BCS can greatly reduce the memory consumption of ...
Through the case study of 3D interactive design of Nanjing Tongji Gate Wall, this paper explores the application of 3D interactive design in relic visual reconstruction. This paper collects literature on Nanjing City Wall and conducts field research and ...
Versatile Video Coding (VVC) is the latest video coding standard, which uses a hybrid coding model. VVC achieves 50% bitrate saving compared with High Efficiency Video Coding (HEVC) standard. However, the encoding complexity of VVC is higher. In this ...
Medical image fusion is to fuse two medical images of different modes into one image containing rich information, in this process, the required information is retained and unnecessary information is suppressed. In the classical bilateral filtering ...
Due to the influence of machine movement, environmental interference and other factors in ROV remote control operation, it is difficult to identify the image features collected underwater, feature points are difficult to extract, and the quality of 3D ...
Images captured in low-light or uneven lighting environments need to use low-light image enhancement techniques to boost brightness and contrast for high-quality improved results. Some existing low-light image enhancement methods over-enhance the image ...
Designing in an environment of Virtual Reality is a field that gains ground. Although more and more applications are constantly released, the majority of designers have not yet been introduced into Virtual Reality. A widely used tool for designing is ...
An adversarial example is an input that a neural network misclassifies although the input differs only slightly from an input that the network classifies correctly. Adversarial examples are used to augment neural network training data, measure the ...
Deep person generation has attracted extensive research attention due to its wide applications in virtual agents, video conferencing, online shopping, and art/movie production. With the advancement of deep learning, visual appearances (face, pose, cloth) ...
This panel explores domain-specific computing from hardware, software, and electronic design automation (EDA) perspectives.
Hennessey and Patterson signaled a new "golden age of computer architecture" in 2018 [1]. Process technology advances and general-...
Macro placement is a critical very large-scale integration (VLSI) physical design problem that significantly impacts the design power-performance-area (PPA) metrics. This paper proposes AutoDMP, a methodology that leverages DREAMPlace, a GPU-accelerated ...
Three-dimensional (3D) modeling of non-linear objects from stylized sketches is a challenge even for computer graphics experts. The extrapolation of object parameters from a stylized sketch is a very complex and cumbersome task. In the present study, we ...
For over a decade, 3D objects are an increasingly popular form of media. It has become necessary and urgent to secure them during their transmission or archiving. In this paper, we propose a new method to obtain a watermarked 3D object from high-capacity ...
We present a robust technique to build a topologically optimal all-hexahedral layer on the boundary of a model with arbitrarily complex ridges and corners. The generated boundary layer mesh strictly respects the geometry of the input surface mesh, and it ...
For control nets outlining a large class of topological polyhedra, not just tensor-product grids, bi-cubic polyhedral splines form a piecewise polynomial, first-order differentiable space that associates one function with each vertex. Akin to tensor-...
When evaluating interactive information retrieval (IIR) interfaces, it is common to collect data using subjective measures such as satisfaction, ease of use, usefulness, and user engagement. However, as these are collected post-task, they serve as ...
We investigate the optimal aesthetic location and size of a single dominant salient region in a photographic image. Existing algorithms for photographic composition do not take full account of spatial positioning or sizes of these salient regions. We ...