Bio: 尚 島影 is an academic researcher. The author has an hindex of 1, co-authored 1 publications receiving 2470 citations.
01 Oct 2008
TL;DR: The database contains labeled face photographs spanning the range of conditions typically encountered in everyday life, and exhibits “natural” variability in factors such as pose, lighting, race, accessories, occlusions, and background.
Abstract: Most face databases have been created under controlled conditions to facilitate the study of specific parameters on the face recognition problem. These parameters include such variables as position, pose, lighting, background, camera quality, and gender. While there are many applications for face recognition technology in which one can control the parameters of image acquisition, there are also many applications in which the practitioner has little or no control over such parameters. This database, Labeled Faces in the Wild, is provided as an aid in studying the latter, unconstrained, recognition problem. The database contains labeled face photographs spanning the range of conditions typically encountered in everyday life. The database exhibits “natural” variability in factors such as pose, lighting, race, accessories, occlusions, and background. In addition to describing the details of the database, we provide specific experimental paradigms for which the database is suitable. This is done in an effort to make research performed with the database as consistent and comparable as possible. We provide baseline results, including results of a state of the art face recognition system combined with a face alignment system. To facilitate experimentation on the database, we provide several parallel databases, including an aligned version.
TL;DR: This review attempts to synthesize the literature on environmental origin, distribution/occurrence, and effects and to catalyze a more focused discussion in the environmental science community.
Abstract: During the last three decades, the impact of chemical pollution has focused almost exclusively on the conventional "priority" pollutants, especially those acutely toxic/carcinogenic pesticides and industrial intermediates displaying persistence in the environment. This spectrum of chemicals, however, is only one piece of the larger puzzle in "holistic" risk assessment. Another diverse group of bioactive chemicals receiving comparatively little attention as potential environmental pollutants includes the pharmaceuticals and active ingredients in personal care products (in this review collectively termed PPCPs), both human and veterinary, including not just prescription drugs and biologics, but also diagnostic agents, "nutraceuticals," fragrances, sun-screen agents, and numerous others. These compounds and their bioactive metabolites can be continually introduced to the aquatic environment as complex mixtures via a number of routes but primarily by both untreated and treated sewage. Aquatic pollution is particularly troublesome because aquatic organisms are captive to continual life-cycle, multigenerational exposure. The possibility for continual but undetectable or unnoticed effects on aquatic organisms is particularly worrisome because effects could accumulate so slowly that major change goes undetected until the cumulative level of these effects finally cascades to irreversible change--change that would otherwise be attributed to natural adaptation or ecologic succession. As opposed to the conventional, persistent priority pollutants, PPCPs need not be persistent if they are continually introduced to surface waters, even at low parts-per-trillion/parts-per-billion concentrations (ng-microg/L). Even though some PPCPs are extremely persistent and introduced to the environment in very high quantities and perhaps have already gained ubiquity worldwide, others could act as if they were persistent, simply because their continual infusion into the aquatic environment serves to sustain perpetual life-cycle exposures for aquatic organisms. This review attempts to synthesize the literature on environmental origin, distribution/occurrence, and effects and to catalyze a more focused discussion in the environmental science community.
01 Jan 2012
TL;DR: This article surveys the literature till 2011 on the enabling technologies for the Smart Grid, and explores three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system.
TL;DR: A suite of security protocols optimized for sensor networks: SPINS, which includes SNEP and μTESLA and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Abstract: Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks: SNEP and μTESLA. SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. μTESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.
01 Jan 2001
TL;DR: In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables.
Abstract: Gigantically comprehensive and carefully researched, Security Engineering makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice. Better, Ross Anderson offers a lot of thoughts on how information can be made more secure (though probably not absolutely secure, at least not forever) with the help of both technologies and management strategies. His work makes fascinating reading and will no doubt inspire considerable doubt--fear is probably a better choice of words--in anyone with information to gather, protect, or make decisions about. Be aware: This is absolutely not a book solely about computers, with yet another explanation of Alice and Bob and how they exchange public keys in order to exchange messages in secret. Anderson explores, for example, the ingenious ways in which European truck drivers defeat their vehicles' speed-logging equipment. In another section, he shows how the end of the cold war brought on a decline in defenses against radio-frequency monitoring (radio frequencies can be used to determine, at a distance, what's going on in systems--bank teller machines, say), and how similar technology can be used to reverse-engineer the calculations that go on inside smart cards. In almost 600 pages of riveting detail, Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. A terrific read for security professionals and general readers alike. --David Wall Topics covered: How some people go about protecting valuable things (particularly, but not exclusively, information) and how other people go about getting it anyway. Mostly, this takes the form of essays (about, for example, how the U.S. Air Force keeps its nukes out of the wrong hands) and stories (one of which tells of an art thief who defeated the latest technology by hiding in a closet). Sections deal with technologies, policies, psychology, and legal matters.