Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
Maximum Consensus Floating Point Solutions for Infeasible Low-Dimensional Linear Programs with Convex Hull as the Intermediate Representation
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue PLDIArticle No.: 197, Pages 1239–1263https://doi.org/10.1145/3656427This paper proposes a novel method to efficiently solve infeasible low-dimensional linear programs (LDLPs) with billions of constraints and a small number of unknown variables, where all the constraints cannot be satisfied simultaneously. We focus on ...
- ArticleMay 2024
- research-articleFebruary 2024
Biomedical signal to image conversion and classification using flexible deep learning techniques
International Journal of Business Intelligence and Data Mining (IJBIDM), Volume 24, Issue 2Pages 183–202https://doi.org/10.1504/ijbidm.2024.136439Most diseases are diagnosed from image data like CT scans, MRIs, and X-rays. Gene data carries vital information related to the diseases that needs to be analysed for diagnosis. Both the logics are combined and a flexible deep ensemble learning-based ...
- research-articleJuly 2023
Metameric: Spectral Uplifting via Controllable Color Constraints
SIGGRAPH '23: ACM SIGGRAPH 2023 Conference ProceedingsArticle No.: 42, Pages 1–10https://doi.org/10.1145/3588432.3591565Spectral rendering is a crucial solution for photorealistic rendering. However, most available texture assets are RGB-only, and access to spectral content is limited. Uplifting methods that recover full spectral representations from RGB inputs have ...
-
- research-articleJune 2023
Content-aware convex hull prediction
MHV '23: Proceedings of the 2nd Mile-High Video ConferencePages 1–7https://doi.org/10.1145/3588444.3590996Efficient bitrate ladders can enhance on-demand streaming services when bandwidth is constrained. Moreover, content-agnostic bitrate-resolution pairs in fixed bitrate ladders can lead to inefficient compression of video contents. Convex hull, which ...
- research-articleJanuary 2023
Obstacle detection technique to solve poor texture appearance of the obstacle by categorising image's region using cues from expansion of feature points for small UAV
International Journal of Computational Vision and Robotics (IJCVR), Volume 13, Issue 1Pages 91–115https://doi.org/10.1504/ijcvr.2023.127300Achieving a reliable obstacle detection system for small unmanned aerial vehicle (UAV) is very challenging due to its size and weight constraints. Prior works tend to employ the vision sensor as main detection sensor but resulting to high dependency on ...
- research-articleNovember 2022
A Polyhedral Study on Fuel-Constrained Unit Commitment
INFORMS Journal on Computing (INFORMS-IJOC), Volume 34, Issue 6Pages 3309–3324https://doi.org/10.1287/ijoc.2022.1235The electricity production of a thermal generator is often constrained by the available fuel supply. These fuel constraints impose a maximum bound on the energy output over multiple time periods. Fuel constraints are increasingly important in electricity ...
- research-articleJune 2022
Stream Computation of 3D Approximate Convex Hulls with an FPGA
- Tatsuma Mori,
- Daiki Furukawa,
- Keigo Motoyoshi,
- Haruto Ikehara,
- Kaito Ohira,
- Taito Manabe,
- Yuichiro Shibata,
- Tomohiro Ueno,
- Kentaro Sano
HEART '22: Proceedings of the 12th International Symposium on Highly-Efficient Accelerators and Reconfigurable TechnologiesPages 69–75https://doi.org/10.1145/3535044.3535053The convex hull is the minimum convex set which encloses a given point set. A problem to find convex hulls is not only one of the most fundamental algorithms in computer geometry, but also has a wide variety of practical applications such as robotics ...
- research-articleJanuary 2022
Efficient Speed-Up of the Smallest Enclosing Circle Algorithm
The smallest enclosing circle is a well-known problem. In this paper, we propose modifications to speed-up the existing Weltzl’s algorithm. We perform the preprocessing to reduce as many input points as possible. The reduction step has lower computational ...
- research-articleJanuary 2022
A robust and efficient fingerprint minutiae extraction in post-processing algorithm
International Journal of Biometrics (IJOB), Volume 14, Issue 1Pages 83–97https://doi.org/10.1504/ijbm.2022.119561Minutiae extraction-based fingerprint recognition is important for person authentication. However, missing and spurious minutiae were leads to inaccuracy. Herein an attempt has been made to overcome this challenge and achieve a higher degree of accuracy ...
- research-articleJune 2021
Minimum Coresets for Maxima Representation of Multidimensional Data
PODS'21: Proceedings of the 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database SystemsPages 138–152https://doi.org/10.1145/3452021.3458322Coresets are succinct summaries of large datasets such that, for a given problem, the solution obtained from a coreset is provably competitive with the solution obtained from the full dataset. As such, coreset-based data summarization techniques have ...
- research-articleJune 2021
Memory-Adjustable Navigation Piles with Applications to Sorting and Convex Hulls
ACM Transactions on Algorithms (TALG), Volume 17, Issue 2Article No.: 18, Pages 1–19https://doi.org/10.1145/3452938We consider space-bounded computations on a random-access machine, where the input is given on a read-only random-access medium, the output is to be produced to a write-only sequential-access medium, and the available workspace allows random reads and ...
- extended-abstractMay 2021
Finite-time Consensus in the Presence of Malicious Agents
AAMAS '21: Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent SystemsPages 1625–1627A finite-time consensus protocol is developed for a connected network of agents, where communication between agents occurs locally, some of the agents are malicious, and the non-malicious or cooperative agents do not know the identities of the malicious ...
- research-articleFebruary 2021
Saliency Detection via Manifold Ranking Based on Robust Foreground
International Journal of Automation and Computing (SPIJAC), Volume 18, Issue 1Pages 73–84https://doi.org/10.1007/s11633-020-1246-zAbstractThe graph-based manifold ranking saliency detection only relies on the boundary background to extract foreground seeds, resulting in a poor saliency detection result, so a method that obtains robust foreground for manifold ranking is proposed in ...
- research-articleJanuary 2021
Communication Costs in a Geometric Communication Network
ICDCN '21: Proceedings of the 22nd International Conference on Distributed Computing and NetworkingPages 36–45https://doi.org/10.1145/3427796.3427800A communication network is a graph in which each node has only local information about the graph and nodes communicate by passing messages along its edges. Here, we consider the geometric communication network where the nodes also occupy points in ...
- research-articleJanuary 2021
Multistage Stochastic Power Generation Scheduling Co-Optimizing Energy and Ancillary Services
INFORMS Journal on Computing (INFORMS-IJOC), Volume 33, Issue 1Pages 352–369https://doi.org/10.1287/ijoc.2019.0933With the increasing penetration of intermittent renewable energy and fluctuating electricity loads, power system operators are facing significant challenges in maintaining system load balance and reliability. In addition to traditional energy markets that ...
- research-articleDecember 2020
A Geometric Approach for CAD Models Classification based on Shallow Learning
CAIH2020: Proceedings of the 2020 Conference on Artificial Intelligence and HealthcarePages 25–29https://doi.org/10.1145/3433996.3434002Automated classification of three-dimensional geometric models is significant for three-dimensional shape retrieval as well as artificial intelligence application in areas such as civil engineering and mechanical engineering. In this paper, we proposed ...
- research-articleSeptember 2020
A Robust Optic Disc Localization Algorithm in Retinal Images Based on Support Vector Machine
ICBIP '20: Proceedings of the 5th International Conference on Biomedical Signal and Image ProcessingPages 25–31https://doi.org/10.1145/3417519.3417552Optic disk (OD) localization is a significant step when processing the retinal images in computer-aided diagnosis. In order to determine the location of OD precisely and robustly, an OD localization algorithm based on support vector machine (SVM) is ...
- research-articleJuly 2020
Randomized Incremental Convex Hull is Highly Parallel
SPAA '20: Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and ArchitecturesPages 103–115https://doi.org/10.1145/3350755.3400255The randomized incremental convex hull algorithm is one of the most practical and important geometric algorithms in the literature. Due to its simplicity, and the fact that many points or facets can be added independently, it is also widely used in ...