Abstract:
The present invention provides a defence technique for malicious device to device (d2d) communication. It involves detecting, tracking and isolating any malicious activity in a d2d disconnected opportunistic network such as MobiBots. The method involves logging exchanged messages across interfaces at an intentionally vulnerable node; monitoring the interfaces; identifying a candidate malicious message; tracking back from messages, including from a candidate malicious message; determining the paths used by the messages; determining the source and/or destination of a path to localise the candidate malicious message source.
Abstract:
A wide spread adoption of 3D videos and technologies is hindered by the lack of high-quality 3D content. One promising solution to address this problem is to use automated 2D-to-3D conversion. However, current conversion methods, while general, produce low-quality results with artefacts that are not acceptable to many viewers. Creating a database of 3D stereoscopic videos with accurate depth is, however, very difficult. Computer generated content can be used to generate high-quality 3D video reference database for 2D-to- 3D conversion. The method transfers depth information from frames in the 3D reference database to the target frame while respecting object boundaries. It computes depth maps from the depth gradients, and outputs a stereoscopic video.
Abstract:
Collaborative rating systems have evolved as important tools for users in dealing with information overload while making decisions pertaining to content hosted on the Web. Such systems allow users to evaluate content in the form of ratings. For example, websites such as yelp.com, imdb.com and amazon.com allow users to express their preferences by rating content-items. An interesting type of pattern in such systems is 'who' rated 'what' and 'how'. A data mining system known as PromPt is disclosed for exploring patterns in ratings given by users to items. A new type of association paradigm called promotional pattern is introduced. Promotional patterns are summarized descriptions of ratings given by a subset of users to a subset of items in the system, and the goal is to mine interesting patterns. Such functionality is demonstrated as being useful in a wide variety of real application scenarios such as business intelligence in promotion and advertising.
Abstract:
A system and method for multimedia content protection on elastic cloud infrastructures is presented. The system can be used to protect various multimedia contents, including regular 2D videos, new 3D videos, animated graphics, images, audios clips, songs, and music clips. The system can run on private clouds, public clouds, or any combination of public-private clouds. The system is scalable and cost effective.
Abstract:
A control system comprises first and second hardware components and a server which is remote from the hardware components. The server is a server in the cloud which is connected via the Internet to the hardware components. A control module is implemented as a service running on the server and the control module is operable to communicate with the hardware components to control at least one of the hardware components.
Abstract:
A tamper detection arrangement for use within an integrated circuit (1 ), the arrangement comprising: at least one input capacitor (4) having a first capacitance value; a feedback capacitor (5) having a second capacitance value; a sensing arrangement comprising an amplifier circuit having the at least one input capacitor as an input and the at least one feedback capacitor in a feedback loop across the amplifier operable to detect a change in the capacitance values between the at least one input capacitor and the feedback capacitor; and a protective shield to protect a sensitive area (2) of the integrated circuit from tampering, the shield being provided by the at least one input capacitor (4).
Abstract:
An arrangement configured to allocate one or more resources of one or more computing devices to a virtual machine, the arrangement comprising : an interface configured to receive a request for the allocation of one or more resources to the virtual machine, the request including information regarding one or more computer programs to be operated by or as a part of the virtual machine; and a hypervisor module configured to use the information regarding one or more computer programs to identify economic information associated with at least one of the computer programs, and to allocate one or more resources to the virtual machine based at least in part on the economic information.
Abstract:
An arrangement configured to allocate resources of a host system to one or more virtual machines, the arrangement comprising: an interface configured to receive a first request from a client system for a first amount of a resource of a host system to be allocated to a first virtual machine and to transmit confirmation to the client system of the allocation of the first amount of the resource; and a hypervisor module configured to allocate an amount of the resource of the host system to the first virtual machine, wherein the amount of the resource allocated to the first virtual machine is less than the first amount of the resource, such that at least a part of the first amount of the resource is available for allocation to a second virtual machine.
Abstract:
A method for processing at least part of a large-scale dataset, the method comprising: receiving a dataset including a plurality of data points; generating a hash value for at least some of the data points; sorting the generated hash values into a plurality of buckets of identical or substantially identical hash values; machine learning algorithm to the similarity matrices.
Abstract:
A computer-implemented method, comprises extracting a measure from a content article representing a probability that the article relates to a topic, allocating the article to a group of articles relating to at least one topic on the basis of the measure, using a set of social media objects relating to the article to extract a measure representing a sentiment for the article, and aggregating respective measures for the sentiment of articles in the group to provide an aggregate measure.