Skip to main content

Showing 1–3 of 3 results for author: Kumar, G V

Searching in archive cs. Search in all archives.
.
  1. arXiv:1808.00136  [pdf, other

    cs.CV

    Multi-modal Cycle-consistent Generalized Zero-Shot Learning

    Authors: Rafael Felix, B. G. Vijay Kumar, Ian Reid, Gustavo Carneiro

    Abstract: In generalized zero shot learning (GZSL), the set of classes are split into seen and unseen classes, where training relies on the semantic features of the seen and unseen classes and the visual representations of only the seen classes, while testing uses the visual representations of the seen and unseen classes. Current methods address GZSL by learning a transformation from the visual to the seman… ▽ More

    Submitted 1 August, 2018; v1 submitted 31 July, 2018; originally announced August 2018.

    Comments: Accepted at ECCV 2018, 15th European Conference on Computer Vision, September 8 to 14, 2018

  2. Mist Computing: Principles, Trends and Future Direction

    Authors: Manas Kumar Yogi, K. Chandrasekhar, G. Vijay Kumar

    Abstract: In this paper we present the novel idea of computing near the edge of IOT architecture which enhances the inherent efficiency while computing complex applications. This concept is termed as mist computing. We believe this computing will bring about an massive revolution in future computing technologies. instead of thrusting the control responsibility to gateways while data transmission the control… ▽ More

    Submitted 6 August, 2017; originally announced September 2017.

  3. arXiv:1402.1943  [pdf

    cs.NI cs.CR

    Proactive Web Server Protocol for Complaint Assessment

    Authors: G. Vijay Kumar, Ravikumar S. Raykundaliya, Dr. P. Naga Prasad

    Abstract: Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to unawareness of software vulnerabilities most of the software before pre-Release the software should be thoroughly tested for not only functionality reliability, but should be tested for the security flows (or) vulnerabi… ▽ More

    Submitted 9 February, 2014; originally announced February 2014.

    Journal ref: International Journal of Computer Trends and Technology (IJCTT) 6(40):4-6, December 2013