共查询到20条相似文献,搜索用时 15 毫秒
1.
Vincent Lepetit Francesc Moreno-Noguer Pascal Fua 《International Journal of Computer Vision》2009,81(2):155-166
We propose a non-iterative solution to the PnP problem—the estimation of the pose of a calibrated camera from n 3D-to-2D point correspondences—whose computational complexity grows linearly with n. This is in contrast to state-of-the-art methods that are O(n
5) or even O(n
8), without being more accurate. Our method is applicable for all n≥4 and handles properly both planar and non-planar configurations. Our central idea is to express the n 3D points as a weighted sum of four virtual control points. The problem then reduces to estimating the coordinates of these
control points in the camera referential, which can be done in O(n) time by expressing these coordinates as weighted sum of the eigenvectors of a 12×12 matrix and solving a small constant number of quadratic equations to pick the right weights. Furthermore, if maximal precision is required, the output of the
closed-form solution can be used to initialize a Gauss-Newton scheme, which improves accuracy with negligible amount of additional
time. The advantages of our method are demonstrated by thorough testing on both synthetic and real-data. 相似文献
2.
Scheduling is one of the most successful application areas of constraint programming mainly thanks to special global constraints
designed to model resource restrictions. Among these global constraints, edge-finding and not-first/not-last are the most
popular filtering algorithms for unary resources. In this paper we introduce new O(n log n) versions of these two filtering algorithms and one more O(n log n) filtering algorithm called detectable precedences. These algorithms use a special data structures Θ-tree and Θ-Λ-tree. These
data structures are especially designed for “what-if” reasoning about a set of activities so we also propose to use them for
handling so called optional activities, i.e. activities which may or may not appear on the resource. In particular, we propose
new O(n log n) variants of filtering algorithms which are able to handle optional activities: overload checking, detectable precedences
and not-first/not-last. 相似文献
3.
R. V. Skuratovsky 《Cybernetics and Systems Analysis》2009,45(1):25-37
The corepresentation of a Sylow p-subgroup of a symmetric group in the form of generating relations is investigated, and a
Sylow subgroup of a group , i.e., an n-fold wreath product of regular cyclic groups of prime order, that is isomorphic to the group of automorphisms
of a spherically homogeneous root tree is also studied.
Translated from Kibernetika i Sistemnyi Analiz, No. 1, pp. 27–41, January–February 2009. 相似文献
4.
Given a graph with a source and a sink node, the NP-hard maximum k-splittable s,t-flow (M
k
SF) problem is to find a flow of maximum value from s to t with a flow decomposition using at most k paths. The multicommodity variant of this problem is a natural generalization of disjoint paths and unsplittable flow problems.
Constructing a k-splittable flow requires two interdepending decisions. One has to decide on k paths (routing) and on the flow values for the paths (packing). We give efficient algorithms for computing exact and approximate
solutions by decoupling the two decisions into a first packing step and a second routing step. Usually the routing is considered
before the packing. Our main contributions are as follows:
(i) We show that for constant k a polynomial number of packing alternatives containing at least one packing used by an optimal M
k
SF solution can be constructed in polynomial time. If k is part of the input, we obtain a slightly weaker result. In this case we can guarantee that, for any fixed ε>0, the computed set of alternatives contains a packing used by a (1−ε)-approximate solution. The latter result is based on the observation that (1−ε)-approximate flows only require constantly many different flow values. We believe that this observation is of interest in
its own right.
(ii) Based on (i), we prove that, for constant k, the M
k
SF problem can be solved in polynomial time on graphs of bounded treewidth. If k is part of the input, this problem is still NP-hard and we present a polynomial time approximation scheme for it. 相似文献
5.
Babette Babich 《AI & Society》2017,32(2):157-166
The question of the contemporary relevance of Heidegger’s reflections on technology to today’s advanced technology is here explored with reference to the notion of “entanglement” towards a review of Heidegger’s understanding of technology and media, including the entertainment industry and modern digital life. Heidegger’s reflections on Gelassenheit have been connected with the aesthetics of the tea ceremony, disputing the material aesthetics of porcelain versus plastic. Here by approaching the art of wabi-sabi as the art of Verfallenheit, I argue that Gelassenheit may be understood in these terms. 相似文献
6.
B. Davvaz 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2008,12(4):409-418
Algebraic systems have many applications in the theory of sequential machines, formal languages, computer arithmetics, design
of fast adders and error-correcting codes. The theory of rough sets has emerged as another major mathematical approach for
managing uncertainty that arises from inexact, noisy, or incomplete information. This paper is devoted to the discussion of
the relationship between algebraic systems, rough sets and fuzzy rough set models. We shall restrict ourselves to algebraic
systems with one n-ary operation and we investigate some properties of approximations of n-ary semigroups. We introduce the notion of rough system in an n-ary semigroup. Fuzzy sets, a generalization of classical sets, are considered as mathematical tools to model the vagueness
present in rough systems. 相似文献
7.
<Emphasis Type="Italic">t</Emphasis>-Private and <Emphasis Type="Italic">t</Emphasis>-Secure Auctions 下载免费PDF全文
In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits, i.e., encrypted circuits, we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically t-private for honest but curious parties; 2) the number of bits that can be learned by malicious adversaries is bounded by the output length of the auction; 3) the computational requirements for participating parties are very low: only random bit choices and bitwise computation of the XOR-function are necessary. Note that one can distinguish between the protocol that generates a garbled circuit for an auction and the protocol to evaluate the auction. In this paper we address both problems. We will present a t-private protocol for the construction of a garbled circuit that reaches the lower bound of 2t + 1 parties, and Finally, we address the problem of bid changes in an auction. a more randomness efficient protocol for (t + 1)^2 parties 相似文献
8.
In spite of significant improvements in video data retrieval, a system has not yet been developed that can adequately respond
to a user’s query. Typically, the user has to refine the query many times and view query results until eventually the expected
videos are retrieved from the database. The complexity of video data and questionable query structuring by the user aggravates
the retrieval process. Most previous research in this area has focused on retrieval based on low-level features. Managing
imprecise queries using semantic (high-level) content is no easier than queries based on low-level features due to the absence
of a proper continuous distance function. We provide a method to help users search for clips and videos of interest in video
databases. The video clips are classified as interesting and uninteresting based on user browsing. The attribute values of clips are classified by commonality, presence, and frequency within each
of the two groups to be used in computing the relevance of each clip to the user’s query. In this paper, we provide an intelligent
query structuring system, called I-Quest, to rank clips based on user browsing feedback, where a template generation from the set of interesting and uninteresting
sets is impossible or yields poor results.
相似文献
Ramazan Savaş Aygün (Corresponding author)Email: |
9.
Stefan Porschen Bert Randerath Ewald Speckenmeyer 《Annals of Mathematics and Artificial Intelligence》2005,43(1-4):173-193
Let F=C
1C
m
be a Boolean formula in conjunctive normal form over a set V of n propositional variables, s.t. each clause C
i
contains at most three literals l over V. Solving the problem exact 3-satisfiability (X3SAT) for F means to decide whether there is a truth assignment setting exactly one literal in each clause of F to true (1). As is well known X3SAT is NP-complete [6]. By exploiting a perfect matching reduction we prove that X3SAT is deterministically decidable in time O(20.18674n
). Thereby we improve a result in [2,3] stating X3SATO(20.2072n
) and a bound of O(20.200002n
) for the corresponding enumeration problem #X3SAT stated in a preprint [1]. After that by a more involved deterministic case analysis we are able to show that X3SATO(20.16254n
). 相似文献
10.
Carsten Steger 《Journal of Mathematical Imaging and Vision》2018,60(2):246-266
We examine the orthographic-n-point problem (OnP), which extends the perspective-n-point problem to telecentric cameras. Given a set of 3D points and their corresponding 2D points under orthographic projection, the OnP problem is the determination of the pose of the 3D point cloud with respect to the telecentric camera. We show that the OnP problem is equivalent to the unbalanced orthogonal Procrustes problem for non-coplanar 3D points and to the sub-Stiefel Procrustes problem for coplanar 3D points. To solve the OnP problem, we apply existing algorithms for the respective Procrustes problems and also propose novel algorithms. Furthermore, we evaluate the algorithms to determine their robustness and speed and conclude which algorithms are preferable in real applications. Finally, we evaluate which algorithm is most suitable as a minimal solver in a RANSAC scheme. 相似文献
11.
Wiesław A. Dudek Jianming Zhan Bijan Davvaz 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2008,12(12):1229-1238
The concept of intuitionistic fuzzy subhyperquasigroups in a hyperquasigroup with respect to an s-norm and a t-norm on intuitionistic fuzzy sets is introduced and their properties of such hyperquasigroups are studied. Intuitionistic
(S, T)-fuzzy relations on a hyperquasigroup G are discussed. In particular, we investigate connections hyperquasigroups with binary quasigroups. 相似文献
12.
Hans-Robert Arndt 《Reliable Computing》2007,13(3):245-259
For the interval system of equations defined by [x] = [A][x] + [b] we derive necessary and sufficient criteria for the existence of solutions [x]. Furthermore we give necessary and sufficient criteria for the convergence of powers of [A]. In contrast to former results we treat complex interval arithmetics. 相似文献
13.
We study optimal approximations of sets in various metric spaces with sets of balls of equal radius. We consider an Euclidean plane, a sphere, and a plane with a special non-uniform metric. The main component in our constructions of coverings are optimal Chebyshev n-networks and their generalizations. We propose algorithms for constructing optimal coverings based on partitioning a given set into subsets and finding their Chebyshev centers in the Euclidean metric and their counterparts in non-Euclidean ones. Our results have both theoretical and practical value and can be used to solve problems arising in security, communication, and infrastructural logistics. 相似文献
14.
A particular class of incomplete factorizations is proposed as preconditioners for the linear system Ax = b where A is a symmetric, large and sparse matrix. The ILDL
T<
(p) factorization (p = 1,2,3, …) determines the density of the lower triangular matrix L selecting the p largest off-diagonal entries of each column during the Gaussian elimination process. This selection may be computationally
expensive, but the effectiveness of the preconditioner allows us to choose very low-density factors to reduce both work time
and storage requirements. This incomplete factorization can be performed reliably on H-matrices. When A is a positive definite matrix, but not an H-matrix, one can perform an incomplete factorization if positive off-diagonal entries are removed or reduced and diagonally
compensated. Numerical results for a variety of problems and comparisons
with other incomplete factorizations are presented.
Received: August 2002 / Accepted: December 2002
RID="*"
ID="*"This work was supported by the Spanish grant BFM 2001-2641. 相似文献
15.
V. D. Ivashchuk 《Gravitation and Cosmology》2010,16(2):118-125
The (n + 1)-dimensional Einstein-Gauss-Bonnet (EGB) model is considered. For diagonal cosmological metrics, the equations of motion
are written as a set of Lagrange equations with the effective Lagrangian containing two “minisuperspace” metrics on ℝ
n
: a 2-metric of pseudo-Euclidean signature and a Finslerian 4-metric proportional to the n-dimensional Berwald-Moor 4-metric. For the case of the “pure” Gauss-Bonnet model, two exact solutions are presented, those
with power-law and exponential dependences of the scale factors (w.r.t. the synchronous time variable) are presented. (The
power-law solution was considered earlier by N. Deruelle, A. Toporensky, P. Tretyakov, and S. Pavluchenko.) In the case of
EGB cosmology, it is shown that for any nontrivial solution with an exponential dependence of scale factors, a
i
(τ) = A
i
exp(v
i
τ), there are no more than three different numbers among v
1, …, v
n
. 相似文献
16.
With the popularization of wireless networks and mobile intelligent terminals, mobile crowd sensing is becoming a promising sensing paradigm. Tasks are assigned to users with mobile devices, which then collect and submit ambient information to the server. The composition of participants greatly determines the quality and cost of the collected information. This paper aims to select fewest participants to achieve the quality required by a sensing task. The requirement namely “t-sweep k-coverage” means for a target location, every t time interval should at least k participants sense. The participant selection problem for “t-sweep k-coverage” crowd sensing tasks is NP-hard. Through delicate matrix stacking, linear programming can be adopted to solve the problem when it is in small size. We further propose a participant selection method based on greedy strategy. The two methods are evaluated through simulated experiments using users’ call detail records. The results show that for small problems, both the two methods can find a participant set meeting the requirement. The number of participants picked by the greedy based method is roughly twice of the linear programming based method. However, when problems become larger, the linear programming based method performs unstably, while the greedy based method can still output a reasonable solution. 相似文献
17.
In this paper, the variations of both subunitary polar factors and Hermitian positive semidefinite polar factors in the polar decomposition are studied. New perturbation bounds of both polar factors are given without the restriction that A and its perturbed matrix à have the same rank. These improve recent results. 相似文献
18.
S. A. Dudin 《Automation and Remote Control》2010,71(1):28-38
We consider a multiline queueing system with joint or single queries. The number of queries in a connection is random and
is not known when the connection is established. Queries arriving during each connection are described by the phase type input
steam. Accepting a connection in the system is restricted by tokens. Connections arriving when no free tokens are present
are refused. Single queries arrive without tokens. If the number of free slots in the system is not enough, the system is
blocked. 相似文献
19.
Consider an n-vertex planar graph G. The depth of an embedding Γ of G is the maximum distance of its internal faces from the external one. Several researchers pointed out that the quality of
a planar embedding can be measured in terms of its depth. We present an O(n
4)-time algorithm for computing an embedding of G with minimum depth. This bound improves on the best previous bound by an O(nlog n) factor. As a side effect, our algorithm improves the bounds of several algorithms that require the computation of a minimum-depth
embedding. 相似文献
20.