View: session overviewtalk overview
Keynote "Intelligence Driven Security - a holistic approach to cybersecurity
Scott Linfoot. MASS (UK)
10:00 | Robust image registration with global intensity transformation SPEAKER: unknown ABSTRACT. This paper presents a registration method for images with global illumination variations. The method is based on a joint iterative optimization (geometric and photometric) of the L1 norm of the intensity error. Two strategies are compared to directly find the appropriate intensity transformation within each iteration: histogram specification and the solution obtained by analyzing the necessary optimality conditions. Such strategies reduce search space of the joint optimization to that of the geometric transformation between the images. |
10:20 | An effective inpainting technique for Hole Filling in DIBR Synthesized Images SPEAKER: unknown ABSTRACT. This paper proposes an effective image inpainting method for Depth-Image-Based Rendering (DIBR) synthesized images technique to solve disocclusion holes problems in texture images and their respective depth maps. Disoccluded areas, or holes, are classified depending on the size of the hole, being more critical those that appear in the border of the objects, normally between two great depth value differences. Exemplar-based inpainting contains the essential process required to replicate texture and structure for large dissocluded area. The proposed technique focus on preprocessing to improve gradient detection using sobel algorithm followed by a Depth-aided Exemplar-based technique gives encouraging results. |
10:40 | Determination of Moving Direction by the Pose Transition of Vehicle in Blind Spot Area SPEAKER: Kang Yi ABSTRACT. Vision-based blind spot monitoring algorithm which uses the rear-view dashboard camera has been recently proposed. In order to determine whether the detected vehicle is approaching or not, it needs a motion estimation module. In this paper, we examine the transition of vehicle’s pose and employ a multi-class HOG and SVM. The relative moving direction can be estimated without use of motion estimation. The experimental results show that the complexity can be considerably reduced with only a slight decrease of recall rate. |
11:00 | Unsupervised high-quality soccer field segmentation SPEAKER: unknown ABSTRACT. Field segmentation is a fundamental step in many soccer applications. However, despite its importance, the existing segmentation algorithms are not able to provide successful results in complex scenarios. Moreover, they require the manual selection of several parameters, hindering their usability. Here, we propose an unsupervised field segmentation strategy based on the estimation of the probability density function of the Green chromaticity of the image, able to provide high-quality results in a wide variety of scenarios. |
10:00 | Reducing Garbage Collection Overhead of Log-Structured File Systems with GC Journaling SPEAKER: Hyuho Gwak ABSTRACT. The log-structured file system (LFS) writes all modifications to storage sequentially with append-only logging scheme. This characteristic of LFS is very advantageous to flash storages since the flash memory does not permit in-place overwrite. However, LFS has a high garbage collection (GC) overhead. In particular, under the lazy metadata update scheme, each GC process should invoke the high-cost checkpointing which flushes all the dirty metadata and normal data to storage. The long GC latency will degrade the response times of user requests. In this paper, we propose a GC journaling technique, which journals only the file system changes relevant to the GC process without invoking the high cost checkpointings. |
10:20 | A Frequency Scaling Model for Energy Efficient DVFS Designs based on Circuit Delay Optimization SPEAKER: Ki Bum Chun ABSTRACT. DVFS techniques that have more than one operating mode provide several pairs of operating frequencies and supply voltages. As circuit delays vary with supply voltages, an effort to optimize the circuit delays is necessarily required. The primary impediment to optimize the extra circuits is an increase of power overheads because it prevents satisfying power constraints of the DVFS design. In this paper, we propose an analytic model to find energy efficient points regarding the power overheads induced by the extra circuit costs. The analytic model consists of two parameters: frequency scaling factor and operational duty cycle. In a parameter sweep, optimal frequencies of a low-power mode can be estimated as compared with a high-performance mode. |
10:40 | System Architecture Patterns A Domain-Based Proposition SPEAKER: unknown ABSTRACT. This paper proposes system architecture patterns (similar to software architecture patterns) and also describes the practical experiences of designing the system architecture of a “combo” product (eg DVD player/recorder combined with TV, Set top Box functionality with Android application ecosystem etc.) based on two separate heterogeneous system architectures. We have proposed five system architecture patterns (currently) via which such combo system architectures can be derived. The first is a simple combination with minimal modifications pattern (SiCo) whereby the external interfaces (both software and hardware) are matched from a final product perspective. The second is a combination with modifications (CoMo) whereby considerable modifications are made to the system from a software and hardware perspective. The third is a central controller pattern (CC) whereby each subsystem exports its key states to a central controller which in turn manages the subsystems and the overall product use cases. The fourth is a Redesign and Re-architect pattern (RDRA), which will re-use certain key components from the independent subsystems but otherwise it is basically a back-to-drawing-board approach. The fifth is an Independent Standalone Subsystems (ISS) pattern whereby the 2 subsystems co-exist without any overlapping use-cases. The details of each pattern are explained together with the scenarios where they can be used. Some of our practical experiences in the industry are also highlighted. |
11:00 | Simplified Floating-Point Units for High Dynamic Range Image and Video Systems SPEAKER: Javier Hormigo ABSTRACT. The upcoming arrival of high dynamic range image and video applications to consumer electronics will force the utilization of floating-point numbers on them. This paper shows that introducing a slight modification on classical floating-point number systems, the implementation of those circuits can be highly improved. For a 16-bit numbers, by using the proposed format, the area and power consumption of a floating-point adder is reduced up to 70% whereas those parameters are maintained for the case of a multiplier. |
11:50 | Mobile Device Management System with Portable Devices SPEAKER: Myeongju Ji ABSTRACT. As the number of smart device users has increased, PC-based smart work environments of businesses and public institutions have opted to adopt mobile offices to support their employees. However, with the trend of BYOD (Bring Your Own Device), security problems such as the leaking of confidential information of businesses and important contents have also developed. Thus, the paper proposes utilization of Portable MDM as the solution to such security threats. |
12:10 | Dedicated Hardware IP Module for Fingerprint Recognition SPEAKER: Macarena C. Martinez-Rodriguez ABSTRACT. This work presents a dedicated hardware IP module for fingerprints recognition based on a feature, named QFingerMap, which is very suitable for VLSI design. FPGA implementation results of the IP module are given. A demonstrator has been developed to evaluate the IP module behavior in a real scenario. |
12:30 | Performance Evaluation of Novel Degree Distribution on Power Law of LT Codes for Internet Technology SPEAKER: unknown ABSTRACT. this paper presents a new degree distribution based on power law so that LT code can perform well. Then we have simulated this proposed degree distribution and have compared this distribution with robust soliton, binomial, pareto and parabolic distributions. Simulation result shows that this proposed degree distribution outperforms compared to other distribution techniques in terms of message length vs. error, encoding decoding time, overhead and iteration. |
12:50 | Application level mechanisms for service continuity in an LTE multimedia broadcast service SPEAKER: Carlos M. Lentisco ABSTRACT. In LTE broadcast, maintaining the service continuity for moving users is a challenge that is still not solved. In this paper, we focus on the problem of users moving between different MBMS areas, taking into account that some characteristics of a service might be different in different areas. Specifically, we focus on minimizing the impact of a handover at the application level, in order to make it possible for a video broadcast application to maintain service continuity when parameters such as video bitrate or video codecs change between different areas, for example from a dense urban deployment area to a sub-urban deployment |