Skip to main content

Showing 1–4 of 4 results for author: Pierre, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.03273  [pdf, other

    cs.CV

    VWise: A novel benchmark for evaluating scene classification for vehicular applications

    Authors: Pedro Azevedo, Emanuella Araújo, Gabriel Pierre, Willams de Lima Costa, João Marcelo Teixeira, Valter Ferreira, Roberto Jones, Veronica Teichrieb

    Abstract: Current datasets for vehicular applications are mostly collected in North America or Europe. Models trained or evaluated on these datasets might suffer from geographical bias when deployed in other regions. Specifically, for scene classification, a highway in a Latin American country differs drastically from an Autobahn, for example, both in design and maintenance levels. We propose VWise, a novel… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  2. arXiv:1907.11621  [pdf, ps, other

    cs.DC

    Fog Computing Applications: Taxonomy and Requirements

    Authors: Arif Ahmed, HamidReza Arkian, Davaadorj Battulga, Ali J. Fahs, Mozhdeh Farhadi, Dimitrios Giouroukis, Adrien Gougeon, Felipe Oliveira Gutierrez, Guillaume Pierre, Paulo R. Souza Jr, Mulugeta Ayalew Tamiru, Li Wu

    Abstract: Fog computing was designed to support the specific needs of latency-critical applications such as augmented reality, and IoT applications which produce massive volumes of data that are impractical to send to faraway cloud data centers for analysis. However this also created new opportunities for a wider range of applications which in turn impose their own requirements on future fog computing platf… ▽ More

    Submitted 26 July, 2019; originally announced July 2019.

  3. arXiv:1901.04830  [pdf, other

    cs.DC cs.CR

    Blockchain enabled fog structure to provide data security in IoT applications

    Authors: Mozhdeh Farhadi, Daniele Miorandi, Guillaume Pierre

    Abstract: IoT provides services by connecting smart devices to the Internet, and exploiting data generated by said devices to enable value-added services to individuals and businesses. In such cases, if data is exposed, tampered or lost, the service would not behave correctly. In this article, we discuss data security in IoT applications across five dimensions: confidentiality, integrity, authenticity, non-… ▽ More

    Submitted 15 January, 2019; originally announced January 2019.

    Comments: Proceedings of Middleware 18th, Rennes, France, December 2018, 2 pages

  4. arXiv:1804.04922  [pdf, other

    cs.CV

    Pose estimation of a single circle using default intrinsic calibration

    Authors: Mariyanayagam Damien, Gurdjos Pierre, Chambon Sylvie, Brunet Florent, Charvillat Vincent

    Abstract: Circular markers are planar markers which offer great performances for detection and pose estimation. For an uncalibrated camera with an unknown focal length, at least the images of at least two coplanar circles are generally required to recover their poses. Unfortunately, detecting more than one ellipse in the image must be tricky and time-consuming, especially regarding concentric circles. On th… ▽ More

    Submitted 13 April, 2018; originally announced April 2018.