1,001 research outputs found

    Video Stream Retrieval of Unseen Queries using Semantic Memory

    Get PDF
    Retrieval of live, user-broadcast video streams is an under-addressed and increasingly relevant challenge. The on-line nature of the problem requires temporal evaluation and the unforeseeable scope of potential queries motivates an approach which can accommodate arbitrary search queries. To account for the breadth of possible queries, we adopt a no-example approach to query retrieval, which uses a query's semantic relatedness to pre-trained concept classifiers. To adapt to shifting video content, we propose memory pooling and memory welling methods that favor recent information over long past content. We identify two stream retrieval tasks, instantaneous retrieval at any particular time and continuous retrieval over a prolonged duration, and propose means for evaluating them. Three large scale video datasets are adapted to the challenge of stream retrieval. We report results for our search methods on the new stream retrieval tasks, as well as demonstrate their efficacy in a traditional, non-streaming video task.Comment: Presented at BMVC 2016, British Machine Vision Conference, 201

    Direct combination: a new user interaction principle for mobile and ubiquitous HCI

    Get PDF
    Direct Combination (DC) is a recently introduced user interaction principle. The principle (previously applied to desktop computing) can greatly reduce the degree of search, time, and attention required to operate user interfaces. We argue that Direct Combination applies particularly aptly to mobile computing devices, given appropriate interaction techniques, examples of which are presented here. The reduction in search afforded to users can be applied to address several issues in mobile and ubiquitous user interaction including: limited feedback bandwidth; minimal attention situations; and the need for ad-hoc spontaneous interoperation and dynamic reconfiguration of multiple devices. When Direct Combination is extended and adapted to fit the demands of mobile and ubiquitous HCI, we refer to it as Ambient Combination (AC) . Direct Combination allows the user to exploit objects in the environment to narrow down the range of interactions that need be considered (by system and user). When the DC technique of pairwise or n-fold combination is applicable, it can greatly lessen the demands on users for memorisation and interface navigation. Direct Combination also appears to offers a new way of applying context-aware information. In this paper, we present Direct Combination as applied ambiently through a series of interaction scenarios, using an implemented prototype system

    Predictable arguments of knowledge

    Get PDF
    We initiate a formal investigation on the power of predictability for argument of knowledge systems for NP. Specifically, we consider private-coin argument systems where the answer of the prover can be predicted, given the private randomness of the verifier; we call such protocols Predictable Arguments of Knowledge (PAoK). Our study encompasses a full characterization of PAoK, showing that such arguments can be made extremely laconic, with the prover sending a single bit, and assumed to have only one round (i.e., two messages) of communication without loss of generality. We additionally explore PAoK satisfying additional properties (including zero-knowledge and the possibility of re-using the same challenge across multiple executions with the prover), present several constructions of PAoK relying on different cryptographic tools, and discuss applications to cryptography

    Interplanetary mission design handbook. Volume 1, part 1: Earth to Venus ballistic mission opportunities, 1991-2005

    Get PDF
    Graphical data necessary for the preliminary design of ballistic missions to Venus is presented. Contours of launch energy requirements, as well as many other launch and arrival parameters, are presented in launch data/arrival date space for all launch opportunities from 1991 through 2005. An extensive text is included which explains mission design methods, from launch window development to Venus probe and orbiter arrival design, utilizing the graphical data in this volume as well as numerous equations relating various parameters

    Interplanetary mission design handbook. Volume 1, part 2: Earth to Mars ballistic mission opportunities, 1990-2005

    Get PDF
    Graphical data necessary for the preliminary design of ballistic missions to Mars are provided. Contours of launch energy requirements, as well as many other launch and Mars arrival parameters, are presented in launch date/arrival date space for all launch opportunities from 1990 through 2005. In addition, an extensive text is included which explains mission design methods, from launch window development to Mars probe and orbiter arrival design, utilizing the graphical data as well as numerous equations relating various parameters

    Clustering of vector nulls in homogeneous isotropic turbulence

    Full text link
    We analyze the vector nulls of velocity, Lagrangian acceleration, and vorticity, coming from direct numerical simulations of forced homogeneous isotropic turbulence at Reλ∈[40−610]Re_\lambda \in [40-610]. We show that the clustering of velocity nulls is much stronger than those of acceleration and vorticity nulls. These acceleration and vorticity nulls, however, are denser than the velocity nulls. We study the scaling of clusters of these null points with ReλRe_\lambda and with characteristic turbulence lengthscales. We also analyze datasets of point inertial particles with Stokes numbers St=0.5St = 0.5, 3, and 6, at Reλ=240Re_\lambda = 240. Inertial particles display preferential concentration with a degree of clustering that resembles some properties of the clustering of the Lagrangian acceleration nulls, in agreement with the proposed sweep-stick mechanism of clustering formation

    The ZAP project:designing interactive computer tools for learning psychology

    Get PDF
    In the ZAP project, a set of interactive computer programs called 'ZAPs' was developed. The programs were designed in such a way that first-year students experience psychological phenomena in a vivid and self-explanatory way. Students can either take the role of participant in a psychological experiment, they can experience phenomena themselves, or they can take the role of researcher and learn by discovery. ZAPs provide added value to existing learning materials about psychological topics and can elicit experiential and discovery learning activities. This article discusses the practical and theoretical considerations that underlie the design and structure of ZAPs and provides guidelines for their practical application in different educational settings. (http://www.informaworld.com/openurl?genre=article&issn=1470-3297&volume=43&issue=4&spage=337

    Deniable Ring Signatures

    Get PDF
    Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.Includes bibliographical references (p. 55-57).Ring Signatures were developed by Rivest, Shamir and Tauman, in a paper titled How to Leak a Secret, as a cryptographically secure way to authenticate messages with respect to ad-hoc groups while still maintaining the signer's anonymity. While their initial scheme assumed the existence of random oracles, in 2005 a scheme was developed that does not use random oracles and meets the strongest security definitions known in the literature. We argue that this scheme is not deniable, meaning if someone signs a message with respect to a ring of possible signers, and at a later time the secret keys of all of the possible signers are confiscated (including the author), then the author's anonymity is no longer guaranteed. We propose a modification to the scheme that guarantees anonymity even in this situation, using a scheme that depends on ring signature users generating keys that do not distinguish them from other users who did not intend to participate in ring signature schemes, so that our scheme can truly be called a deniable ring signature scheme.by Eitan Reich.M.Eng
    • …
    corecore