This handbook presents a thorough overview in 45 chapters from more than 100 renowned experts in the field. It provides the tools to help overcome the problems of video storage, cataloging, and retrieval, by exploring content standardization and other content classification and analysis methods. The challenge of these complex problems make this book a must-have for video database practitioners in the fields of image and video processing, computer vision, multimedia systems, data mining, and many other diverse disciplines. Topics include video segmentation and summarization, archiving and retrieval, and modeling and representation.
標簽: handbook chapters presents overview
上傳時間: 2013-12-15
上傳用戶:yuzsu
Pipeline synchronization is a simple, low-cost, highbandwidth,highreliability solution to interfaces between synchronous and asynchronous systems, or between synchronous systems operating from different clocks.
標簽: synchronization highreliability highbandwidth interfaces
上傳時間: 2014-12-05
上傳用戶:l254587896
This paper presents several low-latency mixed-timing FIFO (first-in–first-out) interfaces designs that interface systems on a chip working at different speeds. The connected systems can be either synchronous or asynchronous. The designs are then adapted to work between systems with very long interconnect delays, by migrating a single-clock solution by Carloni et al. (1999, 2000, and 2001) (for “latency-insensitive” protocols) to mixed-timing domains. The new designs can be made arbitrarily robust with regard to metastability and interface operating speeds. Initial simulations for both latency and throughput are promising.
標簽: mixed-timing low-latency interfaces first-out
上傳時間: 2015-10-08
上傳用戶:dapangxie
1、對于凱撒密文,實現了:1種盲目式搜索,4種啟發式搜索,以及利用密鑰實現的凱撒加密系統。 2、對于代入法密文,實現了:2種啟發式搜索,1種利用密鑰的代入法加密系統以及隨機生成密鑰的代入法加密系統。 3、字典工具,實現了對詞庫的增加,刪除,檢查等一系列的操作。 4、7種其他較為經典的加密方法的加密解密工具。包括:DES、Vigenere、IDEA、Keyword、LFSR、Playfair以及RC4等。
標簽:
上傳時間: 2014-01-06
上傳用戶:chenxichenyue
This book describes the following communications applications: Mail, Message Handler( MH), Transmission ControlProtocol/ Internet Protocol(TCP/ IP), Basic Networking Utilities( BNU), and Asynchronous Terminal Emulation( ATE). It provides overviews, concepts, and procedures on receiving and sending mail and messages, transferring files( ftp command), printing files from and to a remote system, running commands on other systems, communicating between local and remote systems, and customizing the communications environment.
標簽: communications applications Transmiss describes
上傳時間: 2013-12-18
上傳用戶:woshini123456
A general technique for the recovery of signicant image features is presented. The technique is based on the mean shift algorithm, a simple nonparametric pro- cedure for estimating density gradients. Drawbacks of the current methods (including robust clustering) are avoided. Feature space of any nature can be processed, and as an example, color image segmentation is dis- cussed. The segmentation is completely autonomous, only its class is chosen by the user. Thus, the same program can produce a high quality edge image, or pro- vide, by extracting all the signicant colors, a prepro- cessor for content-based query systems. A 512 512 color image is analyzed in less than 10 seconds on a standard workstation. Gray level images are handled as color images having only the lightness coordinate
標簽: technique presented features recovery
上傳時間: 2015-10-14
上傳用戶:410805624
Scalable Wavelet Coding for Synthetic/Natural Hybrid Images IEEE Transactions on Circuits and Systems for Video Technology
標簽: Transactions Synthetic Scalable Circuits
上傳時間: 2015-10-18
上傳用戶:ryb
Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely acclaimed Exceptional C++ leaves off, providing successful strategies for solving real-world problems in C++. Drawing from years of in-the-trenches experience, Herb Sutter provides tested techniques and practical solutions for programmers designing modern software systems with C++, from small projects to enterprise applications.
標簽: problem-and-solution Exceptional Organized practical
上傳時間: 2015-10-20
上傳用戶:chenbhdt
書名:基本商業程序的建模 Essential Business Process Modeling (Paperback) 作者: Mike Havey 出版商:O Reilly 1 edition (August 18, 2005) 內容介紹: Ten years ago, groupware bundled with email and calendar applications helped track the flow of work from person to person within an organization. Workflow in today s enterprise means more monitoring and orchestrating massive systems. A new technology called Business Process Management, or BPM, helps software architects and developers design, code, run, administer, and monitor complex network-based business processes. BPM replaces those sketchy flowchart diagrams that business analysts draw on whiteboards with a precise model that uses standard graphical and XML representations, and an architecture that allows it converse with other services, systems, and users.
標簽: Essential Paperback Business Modeling
上傳時間: 2015-10-21
上傳用戶:zhangyigenius
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.
標簽: applications operating security software
上傳時間: 2015-11-01
上傳用戶:fhzm5658