![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Computer vision
ThisbookattemptstocapturesomeoftheexcitementofaninspiringDagstuhl SeminarinJanuary2007. Theauthorsreportonrecentresearchresultsaswell as opining on future directions for the analysis and visualization of tensor ?elds. Topics range from applications of the analysis of tensor ?elds to purer researchintotheirmathematical andanalytical properties. Oneofthegoalsof thisseminarwastobringtogetherresearchersfromalongthatpure-to-applied disciplinary axis with the hope of fostering new collaborations and research. This book, we hope, will continue to further that goal in a broader context. Providence, Rhode Island, USA David H. Laidlaw Saarbruc ] ken, Saarland, Germany Joachim Weickert August 2008 Contents Part I Models for Di?usion MRI Modelling, Fitting and Sampling in Di?usion MRI Daniel C. Alexander. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Tensors, Polynomials and Models for Directional Data P. G. Batchelor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 A Mixture of Wisharts (MOW) Model for Multi?ber Reconstruction ] Bing Jian, Baba C. Vemuri, and Evren Ozarslan. . . . . . . . . . . . . . . . . . . . . 39 The Algebra of Fourth-Order Tensors with Application to Di?usion MRI Maher Moakher. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Part II Higher-Level Analysis of Di?usion Images Structure-Speci?c StatisticalMappingofWhiteMatterTracts Paul A. Yushkevich, Hui Zhang, Tony J. Simon, and James C. Gee. . . . 83 Analysis of Distance/Similarity Measures for Di?usion Tensor Imaging T. H. J. M. Peeters, P. R. Rodrigues, A. Vilanova, and B. M. ter Haar Romeny . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 XContents Part III Tensor Field Visualization Tensor Glyph Warping: Visualizing Metric Tensor Fields using Riemannian Exponential Maps Anders Brun and Hans Knutsson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Interactive Volume Rendering of Di?usion Tensor Data Mario Hlawitschka, Gunther H. Weber, Alfred Anwander, Owen T. Carmichael, Bernd Hamann, and Gerik Scheuermann. . . . . . . . 161 Dense Glyph Sampling for Visualization Louis Feng, Ingrid Hotz, Bernd Hamann, and Kenneth Joy. . . . . . . . . . . ."
One of the grand challenges for computational intelligence and biometrics is to understand how people process and recognize faces and to develop automated and reliable face recognition systems. Biometrics has become the major component in the complex decision making process associated with security applications. The many challenges addressed for face detection and authentication include cluttered environments, occlusion and disguise, temporal changes, and last but not least, robust training and open set testing. Reliable Face Recognition Methods seeks to comprehensively address the face recognition problem while drawing inspiration and gaining new insights from complementary fields of endeavor such as neurosciences, statistics, signal and image processing, computer vision, and machine learning and data mining. The book examines the evolution of research surrounding the field to date, explores new directions, and offers specific guidance on the most promising venues for future R&D. With its well-focused approach and clarity of presentation, this new text/reference is an excellent resource for computer scientists and engineers, researchers, and professionals who need to learn about face recognition. In addition, the book is ideally suited to students studying biometrics, pattern recognition, and human-computer interaction.
Similarity-based learning methods have a great potential as an intuitive and ?exible toolbox for mining, visualization,and inspection of largedata sets. They combine simple and human-understandable principles, such as distance-based classi?cation, prototypes, or Hebbian learning, with a large variety of di?erent, problem-adapted design choices, such as a data-optimum topology, similarity measure, or learning mode. In medicine, biology, and medical bioinformatics, more and more data arise from clinical measurements such as EEG or fMRI studies for monitoring brain activity, mass spectrometry data for the detection of proteins, peptides and composites, or microarray pro?les for the analysis of gene expressions. Typically, data are high-dimensional, noisy, and very hard to inspect using classic (e. g. , symbolic or linear) methods. At the same time, new technologies ranging from the possibility of a very high resolution of spectra to high-throughput screening for microarray data are rapidly developing and carry thepromiseofane?cient,cheap,andautomaticgatheringoftonsofhigh-quality data with large information potential. Thus, there is a need for appropriate - chine learning methods which help to automatically extract and interpret the relevant parts of this information and which, eventually, help to enable und- standingofbiologicalsystems,reliablediagnosisoffaults,andtherapyofdiseases such as cancer based on this information. Moreover, these application scenarios pose fundamental and qualitatively new challenges to the learning systems - cause of the speci?cs of the data and learning tasks. Since these characteristics are particularly pronounced within the medical domain, but not limited to it and of principled interest, this research topic opens the way toward important new directions of algorithmic design and accompanying theory.
This volume contains the papers presented at the 7th IAPR-TC-15 Workshop onGraph-BasedRepresentationsinPatternRecognition- GbR2009.Thewo- shop was held in Venice, Italy between May 26-28, 2009. The previous wo- shops in the series were held in Lyon, France (1997), Haindorf, Austria (1999), Ischia, Italy (2001), York, UK (2003), Poitiers, France (2005), and Alicante, Spain (2007). The Technical Committee (TC15, http: //www.greyc.ensicaen.fr/iapr-tc15/) of the IAPR (International Association for Pattern Recognition) was founded in order to federate and to encourage research work at the intersection of pattern recognition and graph theory. Among its activities, the TC15 encourages the organization of special graph sessions in many computer vision conferences and organizes the biennial GbR Workshop. The scienti?c focus of these workshops coversresearchin pattern recognition and image analysis within the graph theory framework. This workshop series traditionally provide a forum for presenting and discussing research results and applications in the intersection of pattern recognition, image analysis and graph theory
Correlation is a robust and general technique for pattern recognition and is used in many applications, such as automatic target recognition, biometric recognition and optical character recognition. The design, analysis and use of correlation pattern recognition algorithms requires background information, including linear systems theory, random variables and processes, matrix/vector methods, detection and estimation theory, digital signal processing and optical processing. This book provides a needed review of this diverse background material and develops the signal processing theory, the pattern recognition metrics, and the practical application know-how from basic premises. It shows both digital and optical implementations. It also contains state-of-the-art technology presented by the team that developed it and includes case studies of significant current interest, such as face and fingerprint recognition. Suitable for advanced undergraduate or graduate students taking courses in pattern recognition theory, whilst reaching technical levels of interest to the professional practitioner.
Welcome to the Proceedings of ICCHP 2010! We were proud to welcome participants from more than 40 countries from all over the world to this year's ICCHP. Since the late 1980s, it has been ICCHP's mission to support and reflect development in the field of "Assistive Technologies," eAccessibility and eInclusion. With a focus on scientific quality, ICCHP has become an important reference in our field. The 2010 conference and this collection of papers once again fulfilled this mission. The International Programme Committee, comprising 106 experts from all over the world, selected 147 full and 44 short papers out of 328 abstracts submitted to ICCHP. This acceptance ratio of about half of the submissions demonstrates our strict pursuit of scientific quality both of the programme and in particular of the proceedings in your hands. An impressive number of experts agreed to organize "Special Thematic Sessions" (STS) for ICCHP 2010. These STS help to bring the meeting into sharper focus in several key areas. In turn, this deeper level of focus helps to collate a state of the art and mainstream technical, social, cultural and political developments.
This volume collects the papers accepted for presentation atMIRAGE 2009. TheMIRAGE conference is continuing to receive international recognition, with this year's presentations coming from 25 countries despite the large wor- wide ?nancial crisis. This time Asia submitted far fewer papers than previously and fewer than Europe. France provedto be the most active scienti?cally with a total of 16 submitted papers. Germany came second (10 submitted papers) and China third (8 papers). We received a total of 83 submissions and accepted 41 as oral presentations, over the three-day event. All papers were reviewed by three to four members of theProgramCommittee.The?nalselectionwasmadebytheConferenceChairs. At this point, we wish to thank the Program Committee and additional referees for their timely and high-quality reviews. We also thank the invited speakers Luc Van Gool, Frank Multon and Raquel Urtasun for kindly accepting to present very interesting talks. mirage 2009 was organizedbyinria Rocquencourt and took place atinria, Rocquencourt, close to Versailles. We believe that the conference proved to be a stimulating experience for all. March 2009 A. Gagalowicz W. Philips Organization Mirage 2009 was organized byinria and Ghent University.
The application of Computational Intelligence in emerging research areas such as Granular Computing, Mechatronics, and Bioinformatics shows its usefulness often emphasized by Prof Lotfi Zadeh, the inventor of fuzzy logic and many others. This book contains recent advances in Computational Intelligence methods for modeling, optimization and prediction and covers a large number of applications. The book presents new Computational Intelligence theory and methods for modeling and prediction. The range of the various applications is captured with 5 chapters in image processing, 2 chapters in audio processing, 3 chapters in commerce and finance, 2 chapters in communication networks and 6 chapters containing other applications.
Attention has represented a core scienti?c topic in the design of AI-enabled systems in the last few decades. Today, in the ongoing debate, design, and c- putationalmodelingofarti?cialcognitivesystems, attentionhasgainedacentral position as a focus of research. For instance, attentional methods are considered in investigating the interfacing of sensory and cognitive information processing, for the organization of behaviors, and for the understanding of individual and social cognition in infant development. Whilevisualcognitionplaysacentralroleinhumanperception, ?ndingsfrom neuroscience and experimental psychology have provided strong evidence about the perception-action nature of cognition. The embodied nature of senso- motor intelligence requires a continuous and focused interplay between the c- trolofmotoractivitiesandtheinterpretationoffeedbackfromperceptualmod- ities. Decision making about the selection of information from the incoming sensory stream - in tune with contextual processing on a current task and an agent's global objectives - becomes a further challenging issue in attentional control. Attention must operate at interfaces between a bottom-up-driven world interpretationandtop-down-driveninformationselection, thusactingatthecore of arti?cial cognitive systems. These insights have already induced changes in AI-related disciplines, such as the design of behavior-based robot control and the computational modeling of animats. Today, the development of enabling technologiessuch as autonomous robotic systems, miniaturizedmobile-evenwearable-sensors, andambientintelligence systems involves the real-time analysis of enormous quantities of data. These data have to be processed in an intelligent way to provide "on time delivery" of the required relevant information. Knowledge has to be applied about what needs to be attended to, and when, and what to do in a meaningful sequence, in correspondence with visual feedback.
The application of geometric algebra to the engineering sciences is a young, active subject of research. The promise of this field is that the mathematical structure of geometric algebra together with its descriptive power will result in intuitive and more robust algorithms. This book examines all aspects essential for a successful application of geometric algebra: the theoretical foundations, the representation of geometric constraints, and the numerical estimation from uncertain data. Formally, the book consists of two parts: theoretical foundations and applications. The first part includes chapters on random variables in geometric algebra, linear estimation methods that incorporate the uncertainty of algebraic elements, and the representation of geometry in Euclidean, projective, conformal and conic space. The second part is dedicated to applications of geometric algebra, which include uncertain geometry and transformations, a generalized camera model, and pose estimation. Graduate students, scientists, researchers and practitioners will benefit from this book. The examples given in the text are mostly recent research results, so practitioners can see how to apply geometric algebra to real tasks, while researchers note starting points for future investigations. Students will profit from the detailed introduction to geometric algebra, while the text is supported by the author's visualization software, CLUCalc, freely available online, and a website that includes downloadable exercises, slides and tutorials.
The International Gesture Workshops (GW) are interdisciplinary events for those researching gesture-based communication across the disciplines. The focus of these events is a shared interest in understanding gestures and sign language in their many facets, and using them for advancing human-machine interaction. Since 1996, International Gesture Workshops have been held roughly every second year, with fully reviewed proceedings published by Springer. The International Gesture Workshop GW 2009 was hosted by Bielefeld University's Center for Interdisciplinary Research (ZiF - Zentrum fur interdisziplinare Forschung) during February 25-27, 2009. Like its predecessors, GW 2009 aimed to provide a platform for participants to share, discuss, and criticize recent and novel research with a multidisciplinary audience. More than 70 computer scientists, linguistics, psychologists, neuroscientists as well as dance and music scientists from 16 countries met to present and exchange their newest results under the umbrella theme "Gesture in Embodied Communication and Human-Computer Interaction. " Consistent with the steady growth of research activity in this area, a large number of high-quality submissions were received, which made GW 2009 an exciting and important event for anyone interested in gesture-related technological research relevant to human-computer interaction. In line with the practice of previous gesture workshops, presenters were invited to submit theirs papers for publication in a subsequent peer-reviewed publication of high quality. The present book is the outcome of this effort. Representing the research work from eight countries, it contains a selection of 28 thoroughly reviewed articles.
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009 was the first mega-conference that attempted to follow the above idea of hybridization in FGIT in a form of multiple events related to particular disciplines of IT, conducted by separate scientific committees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D- aster Recovery and Business Continuity (DRBC; published independently), Future G- eration Communication and Networking (FGCN) that was combined with Advanced Communication and Networking (ACN), Grid and Distributed Computing (GDC), M- timedia, Computer Graphics and Broadcasting (MulGraB), Security Technology (SecTech), Signal Processing, Image Processing and Pattern Recognition (SIP), and- and e-Service, Science and Technology (UNESST).
th It is our great pleasure to present in this volume the proceedings of the 6 Inter- tional Workshop on Digital Watermarking (IWDW), which was held in Guangzhou, China, during December 3-5, 2007. The workshop was hosted by the Sun Yat-sen University and sponsored by both the National Science Foundation of China and the Korea Institute of Information Security and Cryptology. Since its birth in the early 1990s, digital watermarking has become a mature e- bling technology for solving security problems associated with multimedia distribution schemes. Digital watermarks are now used in applications such as broadcast monit- ing, movie fingerprinting, digital rights management, and document authentication, to name but a few. Still, many research challenges remain open, among them security and robustness issues, reversibility and authentication. Continuing the tradition of previous workshops, IWDW 2007 also featured-besides papers dealing with digital watermarking-contributions from other related fields, such as steganography, ste- nalysis and digital forensics.
A key driving factor for biometrics is the widespread national and international depl- ment of biometric systems that has been initiated in the past two years and is about to accelerate. While nearly all current biometric deployments are government-led and pr- cipally concerned with national security and border control scenarios, it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ev- increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply the creation and update of a biometric template, but requires the development of instruments to properly handle all the data and operations related to the user identity. COST Action 2101 on Biometrics for Identity Documents and Smart Cards has - erated as a valuable and effective platform for close collaboration of European sci- tists from academia and industry researching biometrics for identity documents and smartcards. This has led to the continuous advances achieved in various classes of biometrics and their implementations in the identity management domain. These c- tributions to knowledge in this field were first presented at the First European Wo- shop on Biometrics and Identity Management (BioID 2008) organized in Roskilde, Denmark during May 7-9, 2008.
The International Gesture Workshop is an interdisciplinary event where researchers working on human gesture-based communication present advanced research currently inprogressandexchangeideasongestureacrossmultidisciplinaryscienti?cdisciplines. This workshop encompasses all fundamental aspects of gestural studies in the ?eld of human-computer interaction and simulation, including all multifaceted issues of m- elling, analysis and synthesis of human gesture, encompassing hand and body gestures andfacial expressions. A focusof these eventsis a sharedinterest in usinggesturein the contextofsign languageanalysis, understandingandsynthesis. Anotherstreamof int- est is the user-centric approach of considering gesture in multimodal human-computer interaction, in the framework of the integration of such interaction into the natural - vironment of users. In addition to welcoming submission of work by established - searchers, it is the tradition of the GW series of workshops to encourage submission of student work at various stages of completion, enabling a broader dissemination of ?nished or on-going novel work and the exchangeof experiences in a multidisciplinary environment. Gesture Workshop 2007 (GW 2007) was the 7th European Gesture Workshop in the GW series initiated in 1996. Since that date, the Gesture Workshops have been held roughly every second year, with fully reviewed proceedings typically published by Springer. GW 2007 was organized by ADETTI at ISCTE-Lisbon University - stitute, during May 23-25, 2007. In GW 2007, from the 53 contributions that were received, 15 high-quality full papers were accepted, along with 16 short papers and 10 posters and demos, showing on-going promising gesture research. Two brilliant keynote speakers honored the event with their presentations.
It is our pleasure to welcome you to the proceedings of the 13th International C- puter Society of Iran Computer Conference (CSICC-2008). The conference has been held annually since 1995, except for 1998, when it transitioned from a year-end to first-quarter schedule. It has been moving in the direction of greater selectivity (see Fig.1) and broader international participation. Holding it in Kish Island this year represents an effort to further facilitate and encourage international contributions. We feel privileged to participate in further advancing this strong technical tradition. 60 50 40 30 20 10 0 Dec 23-26 Dec 23-25 Dec 23-25 Jan 26-28 Mar 8-10 Feb 21-23 Feb 28-30 Feb 23-26 Feb 16-19 Feb 15-18 Jan 24-26 Feb 20-22 Mar 9-11 1995 1996 1997 Iran 1999 2000 2001 U of 2002 Iran 2003 2004 2005 Iran 2006 IPM, 2007 2008 Sharif U Amirkabir U of Sharif U Shahid Isfahan, Telecom Ferdowsi Sharif U Telecom Tehran Shahid Sharif U of Tech, U of Tech, Sci/Tech, of Tech, Beheshti Isfahan Res. U, of Tech, Res. Beheshti of Tech, Tehran Tehran Tehran Tehran U, Tehran Center Mashhad Tehran Center U, Tehran Kish Island Dates, Year, Venue
We are pleased to present this set of peer-reviewed papers from the ?rst MICCAI Workshop on Medical Content-Based Retrieval for Clinical Decision Support. The MICCAI conference has been the ?agship conference for the m- ical imaging community re?ecting the state of the art in techniques of segm- tation, registration, and robotic surgery. Yet, the transfer of these techniques to clinical practice is rarely discussed in the MICCAI conference. To address this gap, we proposed to hold this workshop with MICCAI in London in September 2009. The goal of the workshop was to show the application of content-based retrieval in clinical decision support. With advances in electronic patient record systems, a large number of pre-diagnosed patient data sets are now bec- ing available. These data sets are often multimodal consisting of images (x-ray, CT, MRI), videos and other time series, and textual data (free text reports and structuredclinicaldata). Analyzing thesemultimodalsourcesfordisease-speci?c information across patients can reveal important similarities between patients and hence their underlying diseases and potential treatments. Researchers are now beginning to use techniques of content-based retrieval to search for disea- speci?c information in modalities to ?nd supporting evidence for a disease or to automatically learn associations of symptoms and diseases. Benchmarking frameworks such as ImageCLEF (Image retrieval track in the Cross-Language Evaluation Forum) have expanded over the past ?ve years to include large m- ical image collections for testing various algorithms for medical image retrieval and classi?cation.
The Workgroup Human-Computer Interaction & Usability Engineering (HCI&UE) of the Austrian Computer Society (OCG) serves as a platform for interdisciplinary - change, research and development. While human-computer interaction (HCI) tra- tionally brings together psychologists and computer scientists, usability engineering (UE) is a software engineering discipline and ensures the appropriate implementation of applications. Our 2008 topic was Human-Computer Interaction for Education and Work (HCI4EDU), culminating in the 4th annual Usability Symposium USAB 2008 held during November 20-21, 2008 in Graz, Austria (http: //usab-symposium.tugraz.at). As with the field of Human-Computer Interaction in Medicine and Health Care (HCI4MED), which was our annual topic in 2007, technological performance also increases exponentially in the area of education and work. Learners, teachers and knowledge workers are ubiquitously confronted with new technologies, which are available at constantly lower costs. However, it is obvious that within our e-Society the knowledge acquired at schools and universities - while being an absolutely necessary basis for learning - may prove insufficient to last a whole life time. Working and learning can be viewed as parallel processes, with the result that li- long learning (LLL) must be considered as more than just a catch phrase within our society, it is an undisputed necessity. Today, we are facing a tremendous increase in educational technologies of all kinds and, although the influence of these new te- nologies is enormous, we must never forget that learning is both a basic cognitive and a social process - and cannot be replaced by technology.
Welcome to the 2008EuropeanConference onComputer Vision. These proce- ings are the result of a great deal of hard work by many people. To produce them, a total of 871 papers were reviewed. Forty were selected for oral pres- tation and 203 were selected for poster presentation, yielding acceptance rates of 4.6% for oral, 23.3% for poster, and 27.9% in total. Weappliedthreeprinciples.First, sincewehadastronggroupofAreaChairs, the ?nal decisions to accept or reject a paper rested with the Area Chair, who wouldbeinformedbyreviewsandcouldactonlyinconsensuswithanotherArea Chair. Second, we felt that authors were entitled to a summary that explained how the Area Chair reached a decision for a paper. Third, we were very careful to avoid con?icts of interest. Each paper was assigned to an Area Chair by the Program Chairs, and each Area Chair received a pool of about 25 papers. The Area Chairs then identi?ed and rankedappropriatereviewersfor eachpaper in their pool, and a constrained optimization allocated three reviewers to each paper. We are very proud that every paper received at least three reviews. At this point, authors were able to respond to reviews. The Area Chairs then needed to reach a decision. We used a series of procedures to ensure careful review and to avoid con?icts of interest. ProgramChairs did not submit papers. The Area Chairs were divided into three groups so that no Area Chair in the group was in con?ict with any paper assigned to any Area Chair in the group
Welcome to the 2008EuropeanConference onComputer Vision. These proce- ings are the result of a great deal of hard work by many people. To produce them, a total of 871 papers were reviewed. Forty were selected for oral pres- tation and 203 were selected for poster presentation, yielding acceptance rates of 4.6% for oral, 23.3% for poster, and 27.9% in total. Weappliedthreeprinciples.First, sincewehadastronggroupofAreaChairs, the ?nal decisions to accept or reject a paper rested with the Area Chair, who wouldbeinformedbyreviewsandcouldactonlyinconsensuswithanotherArea Chair. Second, we felt that authors were entitled to a summary that explained how the Area Chair reached a decision for a paper. Third, we were very careful to avoid con?icts of interest. Each paper was assigned to an Area Chair by the Program Chairs, and each Area Chair received a pool of about 25 papers. The Area Chairs then identi?ed and rankedappropriatereviewersfor eachpaper in their pool, and a constrained optimization allocated three reviewers to each paper. We are very proud that every paper received at least three reviews. At this point, authors were able to respond to reviews. The Area Chairs then needed to reach a decision. We used a series of procedures to ensure careful review and to avoid con?icts of interest. ProgramChairs did not submit papers. The Area Chairs were divided into three groups so that no Area Chair in the group was in con?ict with any paper assigned to any Area Chair in the group
This book contains refereed and improved papers presented at the Seventh IAPR Workshop on Graphics Recognition (GREC2007), held in Curitiba, Brazil, September 20-21, 2007. The GREC workshops provide an excellent opportunity for researchers and practitioners at all levels of experience to meet colleagues and to share new ideas and knowledge about graphics recognition methods. Graphics recognition is a subfield of document image analysis that deals with graphical entities in engineering drawings, sketches, maps, architectural plans, musical scores, mathematical notation, tables, diagrams, etc. GREC2007 continued the tradition of past workshops held at Penn State University, USA (GREC 1995, LNCS Volume 1072, Springer, 1996); Nancy, France (GREC 1997, LNCS Volume 1389, Springer, 1998); Jaipur, India (GREC 1999, LNCS Volume 1941, Springer, 2000); Kingston, Canada (GREC 2001, LNCS Volume 2390, Springer, 2002); Barcelona, Spain (GREC 2003, LNCS Volume 3088, Springer, 2004); and Hong Kong, China (GREC 2005, LNCS Volume 3926, Springer, 2006). GREC2007 was also the first edition of a GREC workshop held at the same location of the ICDAR conference and it facilitated people to attend to both events. The program of GREC2007 was organized in a single-track 2-day workshop. It comprised several sessions dedicated to specific topics.
This book constitutes the refereed proceedings of the 13th Iberoamerican Congress on Pattern Recognition, CIARP 2008, held in Havana, Cuba, in September 2008. The 93 revised full papers presented together with 3 keynote articles were carefully reviewed and selected from 182 submissions. The papers are organized in topical sections on signal analysis for characterization and filtering, analysis of shape and texture, analysis of speech and language, data mining, clustering of images and documents, statistical pattern recognition, classification and description of objects, classification and edition, geometric image analysis, neural networks, computer vision, image coding, associative memories and neural networks, interpolation and video tracking, images analysis, music and speech analysis, as well as classifier combination and document filtering.
This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the Second International Workshop on Computational Forensics (IWCF 2008), held August 7-8, 2008. It was a great honor for the organizers to host this scienti?c event at the renowned National Academy of Sciences: Keck Center in Washington, DC, USA. Computational Forensics is an emerging research domain focusing on the investigation of forensic problems using computational methods. Its primary goalis the discoveryand advancement of forensicknowledgeinvolving modeling, computer simulation, and computer-based analysis and recognition in studying and solving forensic problems. The Computational Forensics workshop series is intended as a forum for researchers and practitioners in all areas of computational and forensic sciences. This forum discusses current challenges in computer-assisted forensic investi- tions and presents recent progress and advances. IWCF addresses a broad spectrum of forensic disciplines that use computer tools for criminal investigation. This year's edition covers presentations on c- putational methods for individuality studies, computer-based3D processing and analysis of skulls and human bodies, shoe print preprocessing and analysis, n- ural language analysis and information retrieval to support law enforcement, analysis and group visualization of speech recordings, scanner and print device forensics, and computer-based questioned document and signature analysis.
The First Asian Conference on Machine Learning (ACML 2009) was held at Nanjing, China during November 2-4, 2009.This was the ?rst edition of a series of annual conferences which aim to provide a leading international forum for researchers in machine learning and related ?elds to share their new ideas and research ?ndings. This year we received 113 submissions from 18 countries and regions in Asia, Australasia, Europe and North America. The submissions went through a r- orous double-blind reviewing process. Most submissions received four reviews, a few submissions received ?ve reviews, while only several submissions received three reviews. Each submission was handled by an Area Chair who coordinated discussions among reviewers and made recommendation on the submission. The Program Committee Chairs examined the reviews and meta-reviews to further guarantee the reliability and integrity of the reviewing process. Twenty-nine - pers were selected after this process. To ensure that important revisions required by reviewers were incorporated into the ?nal accepted papers, and to allow submissions which would have - tential after a careful revision, this year we launched a "revision double-check" process. In short, the above-mentioned 29 papers were conditionally accepted, and the authors were requested to incorporate the "important-and-must"re- sionssummarizedbyareachairsbasedonreviewers'comments.Therevised?nal version and the revision list of each conditionally accepted paper was examined by the Area Chair and Program Committee Chairs. Papers that failed to pass the examination were ?nally rejected.
This volumecontains the paperspresented at VizSec 2008, the 5th International Workshop on Visualization for Cyber Security, held on September 15, 2008 in Cambridge, Massachusetts, USA. VizSec 2008 was held in conjunction with the 11thInternationalSymposiumonRecentAdvancesinIntrusionDetection(RAID). There were 27 submissions to the long and short paper categories. Each submission was reviewed by at least 2 reviewers and, on average, 2.9 program committee members. The program committee decided to accept 18 papers. The program also included an invited talk and a panel. The keynote address was given by Ben Shneiderman, University of Maryland at College Park, on the topic InformationForensics: HarnessingVisualizationto SupportDiscovery.The panel, on the topic The Need for Applied Visualization in Information Security Today, wasorganizedandmoderatedbyTobyKohlenbergfromIntelCorporation. July 2008 John R. Goodall Conference Organization Program Chairs John R. Goodall Secure Decisions division of Applied Visions Gregory Conti United States Military Academy Kwan-Liu Ma University of California at Davis Program Committee Stefan Axelsson Blekinge Institute of Technology Richard Bejtlich General Electric Kris Cook Paci?c Northwest National Laboratory David Ebert Purdue University Robert Erbacher Utah State University Deborah Frincke Paci?c Northwest National Laboratory Carrie Gates CA Labs John Gerth Stanford University Barry Irwin Rhodes University Daniel Keim University of Konstanz Toby Kohlenberg Intel Corporation Stuart Kurkowski Air Force Institute of Technology Kiran Lakkaraju University of Illinois at Urbana-Champaign Ra?ael Marty Splunk Douglas Maughan Department of Homeland Security John McHugh Dalhousie University Penny Rheingans UMBC Lawrence Rosenblum National Science Foundation George Tadda Air Force Research Lab Daniel Tesone Applied Visions Alfonso Valdes SRI Internatio |
You may like...
A Journey Through Discrete Mathematics…
Martin Loebl, Jaroslav Nesetril, …
Hardcover
R4,413
Discovery Miles 44 130
Descriptor Revision - Belief Change…
Sven Ove Hansson
Hardcover
|