2,397 research outputs found
Multi-Step Processing of Spatial Joins
Spatial joins are one of the most important operations for combining spatial objects of several relations. In this paper, spatial join processing is studied in detail for extended spatial objects in twodimensional data space. We present an approach for spatial join processing that is based on three steps. First, a spatial join is performed on the minimum bounding rectangles of the objects returning a set of candidates. Various approaches for accelerating this step of join processing have been examined at the last yearâs conference [BKS 93a]. In this paper, we focus on the problem how to compute the answers from the set of candidates which is handled by
the following two steps. First of all, sophisticated approximations
are used to identify answers as well as to filter out false hits from
the set of candidates. For this purpose, we investigate various types
of conservative and progressive approximations. In the last step, the
exact geometry of the remaining candidates has to be tested against
the join predicate. The time required for computing spatial join
predicates can essentially be reduced when objects are adequately
organized in main memory. In our approach, objects are first decomposed
into simple components which are exclusively organized
by a main-memory resident spatial data structure. Overall, we
present a complete approach of spatial join processing on complex
spatial objects. The performance of the individual steps of our approach
is evaluated with data sets from real cartographic applications.
The results show that our approach reduces the total execution
time of the spatial join by factors
A survey of outlier detection methodologies
Outlier detection has been used for centuries to detect and, where appropriate, remove anomalous observations from data. Outliers arise due to mechanical faults, changes in system behaviour, fraudulent behaviour, human error, instrument error or simply through natural deviations in populations. Their detection can identify system faults and fraud before they escalate with potentially catastrophic consequences. It can identify errors and remove their contaminating effect on the data set and as such to purify the data for processing. The original outlier detection methods were arbitrary but now, principled and systematic techniques are used, drawn from the full gamut of Computer Science and Statistics. In this paper, we introduce a survey of contemporary techniques for outlier detection. We identify their respective motivations and distinguish their advantages and disadvantages in a comparative review
Action Recognition in Videos: from Motion Capture Labs to the Web
This paper presents a survey of human action recognition approaches based on
visual data recorded from a single video camera. We propose an organizing
framework which puts in evidence the evolution of the area, with techniques
moving from heavily constrained motion capture scenarios towards more
challenging, realistic, "in the wild" videos. The proposed organization is
based on the representation used as input for the recognition task, emphasizing
the hypothesis assumed and thus, the constraints imposed on the type of video
that each technique is able to address. Expliciting the hypothesis and
constraints makes the framework particularly useful to select a method, given
an application. Another advantage of the proposed organization is that it
allows categorizing newest approaches seamlessly with traditional ones, while
providing an insightful perspective of the evolution of the action recognition
task up to now. That perspective is the basis for the discussion in the end of
the paper, where we also present the main open issues in the area.Comment: Preprint submitted to CVIU, survey paper, 46 pages, 2 figures, 4
table
Perceptual Grouping for Contour Extraction
This paper describes an algorithm that efficiently groups line segments into perceptually salient contours in complex images. A measure of affinity between pairs of lines is used to guide group formation and limit the branching factor of the contour search procedure. The extracted contours are ranked, and presented as a contour hierarchy. Our algorithm is able to extract salient contours in the presence of texture, clutter, and repetitive or ambiguous image structure. We show experimental results on a complex line-set. 1
AoI-based Multicast Routing over Voronoi Overlays with Minimal Overhead
The increasing pervasive and ubiquitous presence of devices at the edge of
the Internet is creating new scenarios for the emergence of novel services and
applications. This is particularly true for location- and context-aware
services. These services call for new decentralized, self-organizing
communication schemes that are able to face issues related to demanding
resource consumption constraints, while ensuring efficient locality-based
information dissemination and querying. Voronoi-based communication techniques
are among the most widely used solutions in this field. However, when used for
forwarding messages inside closed areas of the network (called Areas of
Interest, AoIs), these solutions generally require a significant overhead in
terms of redundant and/or unnecessary communications. This fact negatively
impacts both the devices' resource consumption levels, as well as the network
bandwidth usage. In order to eliminate all unnecessary communications, in this
paper we present the MABRAVO (Multicast Algorithm for Broadcast and Routing
over AoIs in Voronoi Overlays) protocol suite. MABRAVO allows to forward
information within an AoI in a Voronoi network using only local information,
reaching all the devices in the area, and using the lowest possible number of
messages, i.e., just one message for each node included in the AoI. The paper
presents the mathematical and algorithmic descriptions of MABRAVO, as well as
experimental findings of its performance, showing its ability to reduce
communication costs to the strictly minimum required.Comment: Submitted to: IEEE Access; CodeOcean: DOI:10.24433/CO.1722184.v1;
code: https://github.com/michelealbano/mabrav
Information Recovery In Behavioral Networks
In the context of agent based modeling and network theory, we focus on the
problem of recovering behavior-related choice information from
origin-destination type data, a topic also known under the name of network
tomography. As a basis for predicting agents' choices we emphasize the
connection between adaptive intelligent behavior, causal entropy maximization
and self-organized behavior in an open dynamic system. We cast this problem in
the form of binary and weighted networks and suggest information theoretic
entropy-driven methods to recover estimates of the unknown behavioral flow
parameters. Our objective is to recover the unknown behavioral values across
the ensemble analytically, without explicitly sampling the configuration space.
In order to do so, we consider the Cressie-Read family of entropic functionals,
enlarging the set of estimators commonly employed to make optimal use of the
available information. More specifically, we explicitly work out two cases of
particular interest: Shannon functional and the likelihood functional. We then
employ them for the analysis of both univariate and bivariate data sets,
comparing their accuracy in reproducing the observed trends.Comment: 14 pages, 6 figures, 4 table
- âŠ