Learn More
In this work, we propose a method for simultaneously learning features and a corresponding similarity metric for person re-identification. We present a deep convolutional architecture with layers specially designed to address the problem of re-identification. Given a pair of images as input, our network outputs a similarity value indicating whether the two(More)
—Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented(More)
Haloxylines A (1) and B (2), new piperidine alkaloids, have been isolated from the chloroform soluble fraction of Haloxylon salicornicum and their structures elucidated by spectroscopic techniques including 2D-NMR. Both the compounds displayed antifungal and cholinesterase enzymes inhibitory potentials.
BACKGROUND Long-term effects of uninephrectomy for kidney donation are of particular interest in the currently increasing practice of living-donor transplantation. We have retrospectively analyzed the general health status and renal and cardiovascular consequences of living-related kidney donation. METHODS Data of living-related kidney donors who were(More)
Keywords: Man-At-The-End Software protection Information security Digital rights management Digital assets Distributed software systems a b s t r a c t Man-At-The-End (MATE) attacks and fortifications are difficult to analyze, model, and evaluate predominantly for three reasons: firstly, the attacker is human and, therefore, utilizes motivation, creativity,(More)
The efficacy of isoniazid (INH) prophylaxis in renal allograft recipients who are on long-term immunosuppression in a region highly prevalent for tuberculosis (TB) was studied. INH (300 mg/d in patients weighing more than 35 kg and 5 mg/kg/d in patients with <35 kg body weight) together with Pyridoxine 50 mg/d for 1 year was started in randomly assigned(More)
(2010) Use of IP addresses for high rate flooding attack detection. Abstract. High-rate flooding attacks (aka Distributed Denial of Service or DDoS attacks) continue to constitute a pernicious threat within the Internet domain. In this work we demonstrate how using packet source IP addresses coupled with a change-point analysis of the rate of arrival of new(More)
Seamless application execution is vital for the usability of various delay-sensitive mobile cloud applications. However, the resource-intensive migration process and intrinsic limitations of the wireless medium impede the realization of seamless execution in mobile cloud computing (MCC) environment. This work is the first comprehensive survey that studies(More)
The recent efforts in Mobile Cloud Computing (MCC) focus on defining novel methods, policies and mechanisms for efficiently leveraging the services of cloud data centers for mitigating resources constraints in mobile devices. To test these newly developed methods and policies, researchers need tools for evaluating the hypothesis prior to deployment on the(More)
Interactive object segmentation has great practical importance in computer vision. Many interactive methods have been proposed utilizing user input in the form of mouse clicks and mouse strokes, and often requiring a lot of user intervention. In this paper, we present a system with a far simpler input method: the user needs only give the name of the desired(More)