Learn More
In this work, we propose a method for simultaneously learning features and a corresponding similarity metric for person re-identification. We present a deep convolutional architecture with layers specially designed to address the problem of re-identification. Given a pair of images as input, our network outputs a similarity value indicating whether the two(More)
—Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented(More)
(2010) Use of IP addresses for high rate flooding attack detection. Abstract. High-rate flooding attacks (aka Distributed Denial of Service or DDoS attacks) continue to constitute a pernicious threat within the Internet domain. In this work we demonstrate how using packet source IP addresses coupled with a change-point analysis of the rate of arrival of new(More)
The recent efforts in Mobile Cloud Computing (MCC) focus on defining novel methods, policies and mechanisms for efficiently leveraging the services of cloud data centers for mitigating resources constraints in mobile devices. To test these newly developed methods and policies, researchers need tools for evaluating the hypothesis prior to deployment on the(More)
Keywords: Man-At-The-End Software protection Information security Digital rights management Digital assets Distributed software systems a b s t r a c t Man-At-The-End (MATE) attacks and fortifications are difficult to analyze, model, and evaluate predominantly for three reasons: firstly, the attacker is human and, therefore, utilizes motivation, creativity,(More)
Interactive object segmentation has great practical importance in computer vision. Many interactive methods have been proposed utilizing user input in the form of mouse clicks and mouse strokes, and often requiring a lot of user intervention. In this paper, we present a system with a far simpler input method: the user needs only give the name of the desired(More)
Collections of filters based on histograms of oriented gradients (HOG) are common for several detection methods, notably, poselets and exemplar SVMs. The main bottleneck in training such systems is the selection of a subset of good filters from a large number of possible choices. We show that one can learn a universal model of part " goodness " based on(More)
The mechanism of forming-free bipolar resistive switching in a Zr/CeOx/Pt device was investigated. High-resolution transmission electron microscopy and energy-dispersive spectroscopy analysis indicated the formation of a ZrOy layer at the Zr/CeOx interface. X-ray diffraction studies of CeOx films revealed that they consist of nano-polycrystals embedded in a(More)
TCP is a dominant protocol for consistent communication over the internet. It provides flow, congestion and error control mechanisms while using wired reliable networks. Its congestion control mechanism is not suitable for wireless links where data corruption and its lost rate are higher. The physical links are transparent from TCP that takes packet losses(More)
The latest developments in mobile computing technology have increased the computing capabilities of smartphones in terms of storage capacity, features support such as multimodal connectivity, and support for customized user applications. Mobile devices are, however, still intrinsically limited by low bandwidth, computing power, and battery lifetime.(More)