Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine Learning (8)
- Artificial intelligence (6)
- Deep Learning (6)
- Machine learning (5)
- Natural Language Processing (5)
-
- Computer vision (4)
- Classification (3)
- Data mining (3)
- Deep learning (3)
- Deep neural networks (3)
- Natural language processing (3)
- Privacy (3)
- Reinforcement Learning (3)
- Remote sensing (3)
- 3D Reconstruction (2)
- Algorithm (2)
- Clustering (2)
- Collaborative filtering (2)
- Computed Tomography (2)
- Computer Vision (2)
- Data Mining (2)
- Delay tolerant network (2)
- Depth estimation (2)
- FCSRs (2)
- Geospatial analysis (2)
- Information retrieval (2)
- Mapping (2)
- RNA-seq (2)
- Reinforcement learning (2)
- Security and Privacy in Vehicular Networks (2)
Articles 91 - 93 of 93
Full-Text Articles in Entire DC Network
Novel Dense Stereo Algorithms For High-Quality Depth Estimation From Images, Liang Wang
Novel Dense Stereo Algorithms For High-Quality Depth Estimation From Images, Liang Wang
Theses and Dissertations--Computer Science
This dissertation addresses the problem of inferring scene depth information from a collection of calibrated images taken from different viewpoints via stereo matching. Although it has been heavily investigated for decades, depth from stereo remains a long-standing challenge and popular research topic for several reasons. First of all, in order to be of practical use for many real-time applications such as autonomous driving, accurate depth estimation in real-time is of great importance and one of the core challenges in stereo. Second, for applications such as 3D reconstruction and view synthesis, high-quality depth estimation is crucial to achieve photo realistic results. …
Checkpointing And Recovery In Distributed And Database Systems, Jiang Wu
Checkpointing And Recovery In Distributed And Database Systems, Jiang Wu
Theses and Dissertations--Computer Science
A transaction-consistent global checkpoint of a database records a state of the database which reflects the effect of only completed transactions and not the re- sults of any partially executed transactions. This thesis establishes the necessary and sufficient conditions for a checkpoint of a data item (or the checkpoints of a set of data items) to be part of a transaction-consistent global checkpoint of the database. This result would be useful for constructing transaction-consistent global checkpoints incrementally from the checkpoints of each individual data item of a database. By applying this condition, we can start from any useful checkpoint of …
A Secure Online Payment System, Shristi Pant
A Secure Online Payment System, Shristi Pant
Theses and Dissertations--Computer Science
An online payment system allows a customer to make a payment to an online merchant or a service provider. Payment gateways, a channel between customers and payment processors, use various security tools to secure a customer’s payment information, usually debit or credit card information, during an online payment. However, the security provided by a payment gateway cannot completely protect a customer’s payment information when a merchant also has the ability to obtain the payment information in some form. Furthermore, not all merchants provide a secure payment environment to their customers and, despite having a standard payment policy, adhere to it. …