![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Computer vision
Arobotmustperceivethethree-dimensionalworldifitistobeeffective there. Yet recovering 3-D information from projected images is difficult, and still remains thesubjectofbasic research. Alternatively, onecan use sensorsthatcanprovidethree-dimensionalrangeinformationdirectly. The technique ofprojecting light-stripesstartedto be used in industrialobject recognition systems asearly asthe 1970s,andtime-of-flight laser-scanning range finders became available for outdoor mobile robotnavigation in the mid-eighties. Once range data are obtained, a vision system must still describe the scene in terms of 3-D primitives such as edges, surfaces, and volumes, and recognize objeCts of interest. Today, the art of sensing, extractingfeatures, and recognizing objectsbymeans ofthree-dimensional rangedataisoneofthemostexcitingresearchareasincomputervision. Three-Dimensional Machine Vision is a collection of papers dealing withthree-dimensionalrangedata. Theauthorsarepioneeringresearchers: some are founders and others are bringingnew excitements in thefield. I have tried to select milestone papers, and my goalhas beento make this bookareferenceworkforresearchersinthree-dimensionalvision. The book is organized into four parts: 3-D Sensors, 3-D Feature Extractions,ObjectRecognitionAlgorithms,andSystemsandApplications. Part I includes four papers which describe the development of unique, capable 3-D range sensors, as well as discussions of optical, geometrical, electronic, and computational issues. Mundy and Porter describe asensor systembasedonstructuredilluminationforinspectingmetalliccastings. In order to achieve high-speed data acquisition, it uses multiple lightstripes withwavelength multiplexing. Case, Jalkio,andKim alsopresentamulti- stripe system and discuss various design issues in range sensing by triangulation. ThenumericalstereocameradevelopedbyAltschuler, Bae, Altschuler, Dijak, Tamburino, and Woolford projects space-coded grid patterns which are generated by an electro-optical programmable spatial viii PREFACE light modulator. Kanade and Fuhrman present a proximity sensor using multipleLEDswhich areconically arranged. Itcan measurebothdistance andorientationofanobject'ssurface.
This book constitutes the joint refereed proceedings of the 15th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2012, and the 16th International Workshop on Randomization and Computation, RANDOM 2012, held in Cambridge, Massachusetts, USA, in August 2011. The volume contains 28 contributed papers, selected by the APPROX Program Committee out of 70 submissions, and 28 contributed papers, selected by the RANDOM Program Committee out of 67 submissions. APPROX focuses on algorithmic and complexity issues surrounding the development of efficient approximate solutions to computationally difficult problems. RANDOM is concerned with applications of randomness to computational and combinatorial problems.
Augmented (AR) and Virtual Reality (VR) technologies are increasingly being used in manufacturing processes. These use real and simulated objects to create a simulated environment that can be used to enhance the design and manufacturing processes. Virtual Reality and Augmented Reality Applications in Manufacturing is written by experts from the world s leading institutions working in virtual manufacturing and gives the state of the art of the field. Features: - Chapters covering the state of the art in VR and AR technology and how these technologies can be applied to manufacturing. - The latest findings in key areas of AR and VR application to manufacturing. - The results of recent cross-disciplinary research projects in the US and Europe showing application solutions of AR and VR technology in real industrial settings. Virtual Reality and Augmented Reality Applications in Manufacturing will be of interest to all engineers wishing to keep up-to-date with technologies that have the potential to revolutionize manufacturing processes over the next few years."
The book is about Gentzen calculi for (the main systems of) modal logic. It is divided into three parts. In the first partwe introduce and discuss the main philosophical ideas related to proof theory, and we try to identify criteria for distinguishing good sequent calculi. In the second part we present the several attempts made from the 50's until today to provide modal logic with Gentzen calculi. In the third and and final part we analyse new calculi for modal logics, called tree-hypersequent calculi, which were recently introduced by the author. We show in a precise and clear way the main results that can be proved with and about them. "
The development of technologies for the identi?cation of individuals has driven the interest and curiosity of many people. Spearheaded and inspired by the Bertillon coding system for the classi?cation of humans based on physical measurements, scientists and engineers have been trying to invent new devices and classi?cation systems to capture the human identity from its body measurements. One of the main limitations of the precursors of today's biometrics, which is still present in the vast majority of the existing biometric systems, has been the need to keep the device in close contact with the subject to capture the biometric measurements. This clearly limits the applicability and convenience of biometric systems. This book presents an important step in addressing this limitation by describing a number of methodologies to capture meaningful biometric information from a distance. Most materials covered in this book have been presented at the International Summer School on Biometrics which is held every year in Alghero, Italy and which has become a ?agship activity of the IAPR Technical Committee on Biometrics (IAPR TC4). The last four chapters of the book are derived from some of the best p- sentations by the participating students of the school. The educational value of this book is also highlighted by the number of proposed exercises and questions which will help the reader to better understand the proposed topics.
Efficient transfer between science and society is crucial for their future development. The rapid progress of information technology and computer systems offers a large potential and new perspectives for solving complex problems. Mathematical modelling and simulation have become important tools not only in scientific investigations but also in analysing, planning and controlling technological and economic processes. Mathematics, imbedded in an interdisciplinary concept, has become a key technology. The book covers the results of a variety of major projects in industrial mathematics following an initiative of the German Federal Ministry of Education and Research. All projects are collaborations of industrial companies and university-based researchers, and range from automotive industry to computer technology and medical visualisation. In general, the projects presented in this volume prove that new mathematical ideas and methods can be decisive for the solution of industrial and economic problems.
As cameras become more pervasive in our daily life, vast amounts of video data are generated. The popularity of YouTube and similar websites such as Tudou and Youku provides strong evidence for the increasing role of video in society. One of the main challenges confronting us in the era of information technology is to - fectively rely on the huge and rapidly growing video data accumulating in large multimedia archives. Innovative video processing and analysis techniques will play an increasingly important role in resolving the difficult task of video search and retrieval. A wide range of video-based applications have benefited from - vances in video search and mining including multimedia information mana- ment, human-computer interaction, security and surveillance, copyright prot- tion, and personal entertainment, to name a few. This book provides an overview of emerging new approaches to video search and mining based on promising methods being developed in the computer vision and image analysis community. Video search and mining is a rapidly evolving discipline whose aim is to capture interesting patterns in video data. It has become one of the core areas in the data mining research community. In comparison to other types of data mining (e. g. text), video mining is still in its infancy. Many challenging research problems are facing video mining researchers.
A central problem in computer vision is to track objects as they move and deform in a video sequence. Stochastic algorithms -- in particular, particle filters and the Condensation algorithm -- have dramatically enhanced the state of the art for such visual tracking problems in recent years. This book presents a unified framework for visual tracking using particle filters, including the new technique of partitioned sampling which can alleviate the "curse of dimensionality" suffered by standard particle filters. The book also introduces the notion of contour likelihood: a collection of models for assessing object shape, colour and motion, which are derived from the statistical properties of image features. Because of their statistical nature, contour likelihoods are ideal for use in stochastic algorithms. A unifying theme of the book is the use of statistics and probability, which enable the final output of the algorithms presented to be interpreted as the computer's "belief" about the state of the world. The book will be of use and interest to students, researchers and practitioners in computer vision, and assumes only an elementary knowledge of probability theory.
This book constitutes the refereed proceedings of the 5th International Conference on Computer Vision/Computer Graphics Collaboration Techniques, MIRAGE 2011, held in Rocquencourt, France, in October 2011. The 23 full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics with focus on Computer Vision/Computer Graphics Collaboration Techniques involving image analysis/synthesis approaches especially concerning theoretical, computational, experimental or industrial aspects of model-based image analysis and image-based model synthesis.
CHAPTER 7: MATCHING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 7. 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 7. 2 Design of the matcher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 7. 3 Model instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 7. 3. 1 Discrimination by size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 7. 3. 2 Discrimination by gross shape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 7. 3. 3 Feature attribute matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 7. 3. 4 Surface attribute matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 7. 3. 5 Classifying surfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 7. 3. 6 Relational consistency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 7. 3. 7 Ordering matches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 7. 4 Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 7. 4. 1 Computing model-to-scene transformations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 7. 4. 2 Matching feature frames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 7. 4. 3 Matching surface frames. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 7. 4. 4 Verification sensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 7. 5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 CHAPTER 8: EXPERIMENTAL RESULTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 8. 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 8. 2 Experiment 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 8. 3 Experiment 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 8. 4 Experiment 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 8. 5 Experiment 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 8. 6 Experiment 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 8. 7 Experiment 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 8. 8 Experiment 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 8. 9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 CHAPTER 9: CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 9. 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 9. 2 Discovering 3-D structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 9. 3 The multi-sensor approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 9. 4 Limitations of the system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 9. 5 Future directions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 - viii - APPENDIX: BICUBIC SPLINE SURFACES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 2. Parametric curves and surfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 3. Coons' patches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 3. 1 Linearly interpolated patches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 3. 2 Hermite interpolation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 3. 3 Curvature continuous patches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The two-volume set LNCS 6468-6469 contains the carefully selected and reviewed papers presented at the eight workshops that were held in conjunction with the 10th Asian Conference on Computer Vision, in Queenstown, New Zealand, in November 2010.From a total of 167 submissions to all workshops, 89 papers were selected for publication. The contributions are grouped together according to the main workshops topics, which were: computational photography and aesthetics; computer vision in vehicle technology: from Earth to Mars; electronic cultural heritage; subspace based methods; video event categorization, tagging and retrieval; visual surveillance; application of computer vision for mixed and augmented reality.
The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held in Xi'an, China in August 2011. The 446 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Mobile Multimedia Communications (MOBIMEDIA 2011) held in Cagliari, Italy, in September 2011 The 26 revised full papers presented were carefully selected from numerous submissions and focus topics such as quality of experience, dynamic spectrum access wireless networks in the TV white spaces, media streaming, mobile visual search, image processing and transmission, and mobile applications.
This book constitutes the refereed proceedings of the First International Conference on Information and Communication Technology for the Fight against Global Warming, ICT-Glow 2011, held in Toulouse, France in August 2011. The 16 revised papers presented were carefully reviewed and selected from 24 submissions. They address the following topics: parallel computing, ICT for transportation, cloud and pervasive computing, measurement and control and storage.
This book constitutes the refereed conference proceedings of the 20th International Workshop on Functional and Constraint Logic Programming, WFLP 2011, held in Odense, Denmark, in July 2011 as Part of the 13th International Symposium on Principles and Practice of Declarative Programming (PPDP 2011), the 22st International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2011), and the 4th International Workshop on Approaches and Applications of Inductive Programming (AAIP 2011). From the 10 papers submitted, 9 were accepted for presentation the proceeding. The papers cover current research in all areas of functional and logic programming as well as the integration of constraint logic and object-oriented programming, and term rewriting.
Data Management and Internet Computing for Image/Pattern Analysis focuses on the data management issues and Internet computing aspect of image processing and pattern recognition research. The book presents a comprehensive overview of the state of the art, providing detailed case studies that emphasize how image and pattern (IAP) data are distributed and exchanged on sequential and parallel machines, and how the data communication patterns in low- and higher-level IAP computing differ from general numerical computation, what problems they cause and what opportunities they provide. The studies also describe how the images and matrices should be stored, accessed and distributed on different types of machines connected to the Internet, and how Internet resource sharing and data transmission change traditional IAP computing. Data Management and Internet Computing for Image/Pattern Analysis is divided into three parts: the first part describes several software approaches to IAP computing, citing several representative data communication patterns and related algorithms; the second part introduces hardware and Internet resource sharing in which a wide range of computer architectures are described and memory management issues are discussed; and the third part presents applications ranging from image coding, restoration and progressive transmission. Data Management and Internet Computing for Image/Pattern Analysis is an excellent reference for researchers and may be used as a text for advanced courses in image processing and pattern recognition.
Monitoring of public and private sites has increasingly become a very sensitive issue resulting in a patchwork of privacy laws varying from country to country -though all aimed at protecting the privacy of the citizen. It is important to remember, however, that monitoring and vi sual surveillance capabilities can also be employed to aid the citizen. The focus of current development is primarily aimed at public and cor porate safety applications including the monitoring of railway stations, airports, and inaccessible or dangerous environments. Future research effort, however, has already targeted citizen-oriented applications such as monitoring assistants for the aged and infirm, route-planning and congestion-avoidance tools, and a range of environment al monitoring applications. The latest generation of surveillance systems has eagerly adopted re cent technological developments to produce a fully digital pipeline of digital image acquisition, digital data transmission and digital record ing. The resultant surveillance products are highly-fiexihle, capahle of generating forensic-quality imagery, and ahle to exploit existing Internet and wide area network services to provide remote monitoring capability.
Face Image Analysis by Unsupervised Learning explores adaptive approaches to image analysis. It draws upon principles of unsupervised learning and information theory to adapt processing to the immediate task environment. In contrast to more traditional approaches to image analysis in which relevant structure is determined in advance and extracted using hand-engineered techniques, Face Image Analysis by Unsupervised Learning explores methods that have roots in biological vision and/or learn about the image structure directly from the image ensemble. Particular attention is paid to unsupervised learning techniques for encoding the statistical dependencies in the image ensemble. The first part of this volume reviews unsupervised learning, information theory, independent component analysis, and their relation to biological vision. Next, a face image representation using independent component analysis (ICA) is developed, which is an unsupervised learning technique based on optimal information transfer between neurons. The ICA representation is compared to a number of other face representations including eigenfaces and Gabor wavelets on tasks of identity recognition and expression analysis. Finally, methods for learning features that are robust to changes in viewpoint and lighting are presented. These studies provide evidence that encoding input dependencies through unsupervised learning is an effective strategy for face recognition. Face Image Analysis by Unsupervised Learning is suitable as a secondary text for a graduate-level course, and as a reference for researchers and practitioners in industry.
"Mobile Authentication: Problems and Solutions" looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine authentication without understanding both humans and machines. Mobile security is not simply security ported to a handset. Handsets have different constraints than traditional computers, and are used in a different way. Text entry is more frustrating, and therefore, it is tempting to use shorter and less complex passwords. It is also harder to detect spoofing. We need to design with this in mind. We also need to determine how exactly to integrate biometric readers to reap the maximum benefits from them. This book addresses all of these issues, and more.
The ability to extract generic 3D objects from images is a crucial step towards automation of a variety of problems in cartographic database compilation, industrial inspection and assembly, and autonomous navigation. Many of these problem domains do not have strong constraints on object shape or scene content, presenting serious obstacles for the development of robust object detection and delineation techniques. Geometric Constraints for Object Detection and Delineation addresses these problems with a suite of novel methods and techniques for detecting and delineating generic objects in images of complex scenes, and applies them to the specific task of building detection and delineation from monocular aerial imagery. PIVOT, the fully automated system implementing these techniques, is quantitatively evaluated on 83 images covering 18 test scenes, and compared to three existing systems for building extraction. The results highlight the performance improvements possible with rigorous photogrammetric camera modeling, primitive-based object representations, and geometric constraints derived from their combination. PIVOT's performance illustrates the implications of a clearly articulated set of philosophical principles, taking a significant step towards automatic detection and delineation of 3D objects in real-world environments. Geometric Constraints for Object Detection and Delineation is suitable as a textbook or as a secondary text for a graduate-level course, and as a reference for researchers and practitioners in industry.
This book constitutes revised selected papers from the 9th International Gesture Workshop, GW 2011, held in Athens, Greece, in May 2011. The 24 papers presented were carefully reviewed and selected from 35 submissions. They are ordered in five sections named: human computer interaction; cognitive processes; notation systems and animation; gestures and signs: linguistic analysis and tools; and gestures and speech.
Advanced Video-Based Surveillance Systems presents second generation surveillance systems that automatically process large sets of signals for performance monitoring tasks. Included is coverage of different architecture designs, customization of surveillance architecture for end-users, advances in the processing of imaging sequences, security systems, sensors, and remote monitoring projects. Examples are provided of surveillance applications in highway traffic control, subway stations, wireless communications, and other areas. This work will be of interest to researchers in image processing, computer vision, digital signal processing, and telecommunications.
This book constitutes the refereed proceedings of the 11th International Symposium on Smart Graphics, SG 2011, held in Bremen, Germany, in July 2011. The 10 revised full papers presented together with 12 short papers and 4 systems demonstrations were carefully reviewed and selected from numerous submissions covering a wide range of topics including view and camera control; three-dimensional modeling; visual information encoding; video projection; information visualization; interaction techniques; visual communication; and graphics and audio.
This book constitutes the refereed proceedings of the 8th
IAPR-TC-15 International Workshop on Graph-Based Representations in
Pattern Recognition, GbRPR 2011, held in Munster, Germany, in May
2011.
This book constitutes the refereed proceedings of the 15th and 16th International Conference on Formal Grammar 2010 and 2011, collocated with the European Summer School in Logic, Language and Information in July 2010/2011. The 19 revised full papers were carefully reviewed and selected from a total of 50 submissions. The papers papers deal with the following topics: formal and computational phonology, morphology, syntax, semantics and pragmatics; model-theoretic and proof-theoretic methods in linguistics; logical aspects of linguistic structure; constraint-based and resource-sensitive approaches to grammar; learnability of formal grammar; integration of stochastic and symbolic models of grammar; foundational, methodological and architectural issues in grammar; mathematical foundations of statistical approaches to linguistic analysis. |
You may like...
Advanced Signal Processing for Industry…
Irshad Ahmad Ansari, Varun Bajaj
Hardcover
R3,271
Discovery Miles 32 710
Advanced Methods and Deep Learning in…
E.R. Davies, Matthew Turk
Paperback
R2,578
Discovery Miles 25 780
Handbook of Pediatric Brain Imaging…
Hao Huang, Timothy Roberts
Paperback
R3,531
Discovery Miles 35 310
Computer-Aided Oral and Maxillofacial…
Jan Egger, Xiaojun Chen
Paperback
R4,451
Discovery Miles 44 510
Deep Learning Models for Medical Imaging
K. C. Santosh, Nibaran Das, …
Paperback
R2,049
Discovery Miles 20 490
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R7,962
Discovery Miles 79 620
|