13 research outputs found

    A quasi-linear algorithm to compute the tree of shapes of n-D images

    Get PDF
    International audienceTo compute the morphological self-dual representation of images, namely the tree of shapes, the state-of-the-art algorithms do not have a satisfactory time complexity. Furthermore the proposed algorithms are only effective for 2D images and they are far from being simple to implement. That is really penalizing since a self-dual representation of images is a structure that gives rise to many powerful operators and applications, and that could be very useful for 3D images. In this paper we propose a simple-to-write algorithm to compute the tree of shapes; it works for \nD images and has a quasi-linear complexity when data quantization is low, typically 12~bits or less. To get that result, this paper introduces a novel representation of images that has some amazing properties of continuity, while remaining discrete

    Predicting and Controlling Resource Usage in a Heterogeneous Active Network

    No full text
    Active network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, inhomogeneous processing can be applied to network traffic. To use such technology safely and efficiently, individual nodes must provide mechanisms to enforce resource limits. This implies that each node must understand the varying resource requirements for specific network traffic. This paper presents an approach to model the CPU time requirements of active applications in a form that can be interpreted among heterogeneous nodes. Further, the paper demonstrates how this approach can be used successfully to control resources consumed at an active-network node and to predict load among nodes in an active network, when integrated within the Active Virtual Network Management Prediction system. 1

    A Root-to-Leaf Algorithm Computing the Tree of Shapes of an Image

    Get PDF
    International audienceWe propose an algorithm computing the tree of shapes of an image, a unified variation of the component trees, proceeding from the root to the leaf shapes in a recursive fashion. It proceeds differently from existing algorithms that start from leaves, which are regional extrema of intensity, and build the intermediate shapes up to the root, which is the whole image. The advantage of the proposed method is a simpler, clearer, and more concise implementation, together with a more favorable running time on natural images. For integer-valued images, the complexity is proportional to the total variation, which is the memory size of the output tree, which makes the algorithm optimal

    DEDICAT 6G - Dynamic coverage extension and distributed intelligence for human centric applications with assured security, privacy and trust:From 5G to 6G

    No full text
    5G networks offer unparalleled data rates and features. However these are still far from what a hyperconnected society and industry needs. Future wireless connectivity Beyond 5G (B5G)/6G will require a smart and green platform that is ultra-fast, highly adaptive, and dependable to support innovative, human-centric applications securely. This is the focus of the EU-funded DEDICAT 6G project, the vision and methodology of which is presented in this paper. DEDICAT 6G investigates enablers for dynamic distribution of intelligence to improve task execution time, energy efficiency, and ultimately, reduce end-to-end latency. The project also examines solutions for dynamic coverage extensions utilizing robots, connected vehicles and drones. The scope also comprises methods for security, privacy, and trust assurance including enablers for novel interaction between humans and digital systems exploiting innovative interfaces and devices, like smart glasses. DEDICAT 6G focuses on four representative 6G use cases: Smart Warehousing, Enhanced Experience, Public Safety and Smart Highway. The developed solutions will be demonstrated and tested in these use cases through experiments in laboratory environments, and larger field evaluations utilizing diverse assets and testing facilities. The aim is to derive results that will showcase substantial improvements in terms of intelligent network load balancing and resource allocation, extended coverage, enhanced security, privacy and trust and human-machine applications, </p
    corecore