0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (3)
  • R500+ (2,104)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Pattern recognition

Understanding Intrusion Detection through Visualization (Paperback, Softcover reprint of hardcover 1st ed. 2006): Stefan... Understanding Intrusion Detection through Visualization (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Stefan Axelsson, David Sands
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. Much work has gone into development of tools to detect ongoing or already perpetrated attacks, but a key shortfall in current intrusion detection systems is the high number of false alarms they produce. This book analyzes the false alarm problem, then applies results from the field of information visualization to the problem of intrusion detection. Four different visualization approaches are presented, mainly applied to data from web server access logs.

The Frailty Model (Paperback, Softcover reprint of hardcover 1st ed. 2008): Luc DuChateau, Paul Janssen The Frailty Model (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Luc DuChateau, Paul Janssen
R2,640 Discovery Miles 26 400 Ships in 10 - 15 working days

Readers will find in the pages of this book a treatment of the statistical analysis of clustered survival data. Such data are encountered in many scientific disciplines including human and veterinary medicine, biology, epidemiology, public health and demography. A typical example is the time to death in cancer patients, with patients clustered in hospitals. Frailty models provide a powerful tool to analyze clustered survival data. In this book different methods based on the frailty model are described and it is demonstrated how they can be used to analyze clustered survival data. All programs used for these examples are available on the Springer website.

Privacy, Security and Trust within the Context of Pervasive Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005):... Privacy, Security and Trust within the Context of Pervasive Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Philip Robinson, Harald Vogt, Waleed Wagealla
R2,841 Discovery Miles 28 410 Ships in 10 - 15 working days

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria.

The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic" problems, leading to a more complete understanding of the social and technical issues in pervasive computing.

Policies and Research in Identity Management - First IFIP WG 11.6 Working Conference on Policies and Research in Identity... Policies and Research in Identity Management - First IFIP WG 11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Elisabeth De Leeuw, Simone Fischer-Hubner, Jimmy C. Tseng, John Borking
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community to focus on interdisciplinary and holistic approaches while retaining the benefits of previous research efforts. In this context, the IFIP Working Group 11.6 on Identity Management has been founded in August 2006. The intention of the Working Group is to offer a broad forum for the exchange of knowledge and for the tracking and discussion of issues and new developments. In this, we take an interdisciplinary approach. Scientists as well as practitioners, from government and business, who are involved in the field of identity management are welcome to participate. The IDMAN 2007 Conference on Policies and Research in Identity Management was the very first conference organized by this Working Group. We aim to organize conferences bi-annually. The IDMAN 2007 Conference has been centered around the theme of National Identity Management or, in other words, identity management in the public sector.

Identification, Adaptation, Learning - The Science of Learning Models from Data (Paperback, Softcover reprint of hardcover 1st... Identification, Adaptation, Learning - The Science of Learning Models from Data (Paperback, Softcover reprint of hardcover 1st ed. 1996)
Sergio Bittanti, Giorgio Picci
R5,662 Discovery Miles 56 620 Ships in 10 - 15 working days

This book collects the lectures given at the NATO Advanced Study Institute From Identijication to Learning held in Villa Olmo, Como, Italy, from August 22 to September 2, 1994. The school was devoted to the themes of Identijication, Adaptation and Learning, as they are currently understood in the Information and Contral engineering community, their development in the last few decades, their inter connections and their applications. These titles describe challenging, exciting and rapidly growing research areas which are of interest both to contral and communication engineers and to statisticians and computer scientists. In accordance with the general goals of the Institute, and notwithstanding the rat her advanced level of the topics discussed, the presentations have been generally kept at a fairly tutorial level. For this reason this book should be valuable to a variety of rearchers and to graduate students interested in the general area of Control, Signals and Information Pracessing. As the goal of the school was to explore a common methodologicalline of reading the issues, the flavor is quite interdisciplinary. We regard this as an original and valuable feature of this book."

Automated Multi-Camera Surveillance - Algorithms and Practice (Paperback, Softcover reprint of hardcover 1st ed. 2008): Omar... Automated Multi-Camera Surveillance - Algorithms and Practice (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Omar Javed, Mubarak Shah
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

The recent development of intelligent surveillance systems has captured the interest of both academic research labs and industry. Automated Multi-Camera Surveillance addresses monitoring of people and vehicles, and detection of threatening objects and events in a variety of scenarios. In this book, techniques for development of an automated multi-camera surveillance system are discussed and proposed. The state-of-the-art in the automated surveillance systems is reviewed as well. Detailed explanation of sub-components of surveillance systems are provided, and enhancements to each of these components are proposed. The authors identify important challenges that such a system must address, and propose solutions. Development of a specific surveillance system called "KNIGHT" is described, along with the authors' experience using it. This book enables the reader to understand the mathematical models and algorithms underlying automated surveillance as well as the benefits and limitations of using such methods.

Multimodal Processing and Interaction - Audio, Video, Text (Paperback, Softcover reprint of hardcover 1st ed. 2008): Petros... Multimodal Processing and Interaction - Audio, Video, Text (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Petros Maragos, Alexandros Potamianos, Patrick Gros
R4,378 Discovery Miles 43 780 Ships in 10 - 15 working days

This volume presents high quality, state-of-the-art research ideas and results from theoretic, algorithmic and application viewpoints. It contains contributions by leading experts in the obsequious scientific and technological field of multimedia. The book specifically focuses on interaction with multimedia content with special emphasis on multimodal interfaces for accessing multimedia information. The book is designed for a professional audience composed of practitioners and researchers in industry. It is also suitable for advanced-level students in computer science.

Handwriting Recognition - Soft Computing and Probabilistic Approaches (Paperback, Softcover reprint of hardcover 1st ed. 2003):... Handwriting Recognition - Soft Computing and Probabilistic Approaches (Paperback, Softcover reprint of hardcover 1st ed. 2003)
Zhiqiang Liu, Jinhai Cai, Richard Buse
R2,861 Discovery Miles 28 610 Ships in 10 - 15 working days

Over the last few decades, research on handwriting recognition has made impressive progress. The research and development on handwritten word recognition are to a large degree motivated by many application areas, such as automated postal address and code reading, data acquisition in banks, text-voice conversion, security, etc. As the prices of scanners, com puters and handwriting-input devices are falling steadily, we have seen an increased demand for handwriting recognition systems and software pack ages. Some commercial handwriting recognition systems are now available in the market. Current commercial systems have an impressive performance in recognizing machine-printed characters and neatly written texts. For in stance, High-Tech Solutions in Israel has developed several products for container ID recognition, car license plate recognition and package label recognition. Xerox in the U. S. has developed TextBridge for converting hardcopy documents into electronic document files. In spite of the impressive progress, there is still a significant perfor mance gap between the human and the machine in recognizing off-line unconstrained handwritten characters and words. The difficulties encoun tered in recognizing unconstrained handwritings are mainly caused by huge variations in writing styles and the overlapping and the interconnection of neighboring characters. Furthermore, many applications demand very high recognition accuracy and reliability. For example, in the banking sector, although automated teller machines (ATMs) and networked banking sys tems are now widely available, many transactions are still carried out in the form of cheques."

Evolutionary Synthesis of Pattern Recognition Systems (Paperback, Softcover reprint of hardcover 1st ed. 2005): Bir Bhanu,... Evolutionary Synthesis of Pattern Recognition Systems (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Bir Bhanu, Yingqiang Lin, Krzysztof Krawiec
R4,356 Discovery Miles 43 560 Ships in 10 - 15 working days

Integrates computer vision, pattern recognition, and AI.

Presents original research that will benefit researchers and professionals in computer vision, pattern recognition, target recognition, machine learning, evolutionary learning, image processing, knowledge discovery and data mining, cybernetics, robotics, automation and psychology

Spatial Hysteresis and Optical Patterns (Paperback, Softcover reprint of hardcover 1st ed. 2002): Nikolay N. Rosanov Spatial Hysteresis and Optical Patterns (Paperback, Softcover reprint of hardcover 1st ed. 2002)
Nikolay N. Rosanov
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

From the reviews: "This book is very well written and contains many important and new original results that certainly play an important role in today 's nonlinear optics." Physicalia

Arts and Technology - First International Conference, ArtsIT 2009, Yi-Lan, Taiwan, September 24-25, 2009, Revised Selected... Arts and Technology - First International Conference, ArtsIT 2009, Yi-Lan, Taiwan, September 24-25, 2009, Revised Selected Papers (Paperback, Edition.)
Fay Huang, Reen-Cheng Wang
R1,525 Discovery Miles 15 250 Ships in 10 - 15 working days

We welcome you to the First International Conference on Arts and Technology (ArtsIT 2009), hosted by CSIE of the National Ilan University and co-organized by the National Science Council, ICST, College of EECS at National Ilan University, Software Simulation Society in Taiwan, ISAC, TCA, NCHC, CREATE-NET, and Institute for Information Industry. ArtsIT2009 was held in Yilan, Taiwan, during September 24-25, 2009. The conference comprised the following themes: * New Media Technologies (Evolutionary systems that create arts or display art works, such as tracking sensors, wearable computers, mixed reality, etc. ) * Software Art (Image processing or computer graphics techniques that create arts, including algorithmic art, mathematic art, advanced modeling and rend- ing, etc. ) * Animation Techniques (2D or 3D computer animations, AI-based animations, etc. ) * Multimedia (Integration of different media, such as virtual reality systems, audio, performing arts, etc. ) * Interactive Methods (Vision-based tracking and recognition, interactive art, etc. ) The conference program started with an opening ceremony, followed by three keynote speeches and four technical sessions distributed over a period of two days. Two poster sessions, one hour each, were scheduled before the afternoon oral sessions. An Int- active Arts Exhibition was held in conjunction with ArtsIT 2009. Twelve well-known digital arts teams from Taiwan exhibited 15 artworks in this event, including 10 int- active installation arts, 4 video arts, and 1 digital print. The conference received around 50 submissions from 15 different countries.

Digital Forensics and Cyber Crime - First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October... Digital Forensics and Cyber Crime - First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October 2, 2009, Revised Selected Papers (Paperback, Edition.)
Sanjay Goel
R1,489 Discovery Miles 14 890 Ships in 10 - 15 working days

The First International Conference on Digital Forensics and Cyber Crime (ICDF2C) was held in Albany from September 30 to October 2, 2009. The field of digital for- sics is growing rapidly with implications for several fields including law enforcement, network security, disaster recovery and accounting. This is a multidisciplinary area that requires expertise in several areas including, law, computer science, finance, networking, data mining, and criminal justice. This conference brought together pr- titioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. All the conference sessions were very well attended with vigorous discussions and strong audience interest. The conference featured an excellent program comprising high-quality paper pr- entations and invited speakers from all around the world. The first day featured a plenary session including George Philip, President of University at Albany, Harry Corbit, Suprintendent of New York State Police, and William Pelgrin, Director of New York State Office of Cyber Security and Critical Infrastructure Coordination. An outstanding keynote was provided by Miklos Vasarhelyi on continuous auditing. This was followed by two parallel sessions on accounting fraud /financial crime, and m- timedia and handheld forensics. The second day of the conference featured a mesm- izing keynote talk by Nitesh Dhanjani from Ernst and Young that focused on psyc- logical profiling based on open source intelligence from social network analysis. The third day of the conference featured both basic and advanced tutorials on open source forensics.

Vision with Direction - A Systematic Introduction to Image Processing and Computer Vision (Paperback, Softcover reprint of... Vision with Direction - A Systematic Introduction to Image Processing and Computer Vision (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Josef Bigun
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days

Image analysis is a computational feat which humans show excellence in, in comp- ison with computers. Yet the list of applications that rely on automatic processing of images has been growing at a fast pace. Biometric authentication by face, ?ngerprint, and iris, online character recognition in cell phones as well as drug design tools are but a few of its benefactors appearing on the headlines. This is, of course, facilitated by the valuable output of the resarch community in the past 30 years. The pattern recognition and computer vision communities that study image analysis have large conferences, which regularly draw 1000 parti- pants. In a way this is not surprising, because much of the human-speci?c activities critically rely on intelligent use of vision. If routine parts of these activities can be automated, much is to be gained in comfort and sustainable development. The - search ?eld could equally be called visualintelligence because it concerns nearly all activities of awake humans. Humans use or rely on pictures or pictorial languages to represent, analyze, and develop abstract metaphors related to nearly every aspect of thinking and behaving, be it science, mathematics, philosopy, religion, music, or emotions. The present volume is an introductory textbook on signal analysis of visual c- putation for senior-level undergraduates or for graduate students in science and - gineering. My modest goal has been to present the frequently used techniques to analyze images in a common framework-directional image processing.

Grouping Multidimensional Data - Recent Advances in Clustering (Paperback, Softcover reprint of hardcover 1st ed. 2006): Jacob... Grouping Multidimensional Data - Recent Advances in Clustering (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Jacob Kogan, Charles Nicholas, Marc Teboulle
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Clustering is one of the most fundamental and essential data analysis techniques. Clustering can be used as an independent data mining task to discern intrinsic characteristics of data, or as a preprocessing step with the clustering results then used for classification, correlation analysis, or anomaly detection.

Kogan and his co-editors have put together recent advances in clustering large and high-dimension data. Their volume addresses new topics and methods which are central to modern data analysis, with particular emphasis on linear algebra tools, opimization methods and statistical techniques. The contributions, written by leading researchers from both academia and industry, cover theoretical basics as well as application and evaluation of algorithms, and thus provide an excellent state-of-the-art overview.

The level of detail, the breadth of coverage, and the comprehensive bibliography make this book a perfect fit for researchers and graduate students in data mining and in many other important related application areas.

Data Mining - A Knowledge Discovery Approach (Paperback, Softcover reprint of hardcover 1st ed. 2007): Krzysztof J. Cios,... Data Mining - A Knowledge Discovery Approach (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Krzysztof J. Cios, Witold Pedrycz, Roman W. Swiniarski, Lukasz Andrzej Kurgan
R2,523 Discovery Miles 25 230 Ships in 10 - 15 working days

This comprehensive textbook on data mining details the unique steps of the knowledge discovery process that prescribes the sequence in which data mining projects should be performed, from problem and data understanding through data preprocessing to deployment of the results. This knowledge discovery approach is what distinguishes Data Mining from other texts in this area.

The book provides a suite of exercises and includes links to instructional presentations. Furthermore, it contains appendices of relevant mathematical material.

Complex Artificial Environments - Simulation, Cognition and VR in the Study and Planning of Cities (Paperback, Softcover... Complex Artificial Environments - Simulation, Cognition and VR in the Study and Planning of Cities (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Juval Portugali
R4,362 Discovery Miles 43 620 Ships in 10 - 15 working days

Juval Portugali The notion of complex artificial environments (CAE) refers to theories of c- plexity and self-organization, as well as to artifacts in general, and to artificial - vironments, such as cities, in particular. The link between the two, however, is not trivial. For one thing, the theories of complexity and self-organization originated in the "hard" science and by reference to natural phenomena in physics and bi- ogy. The study of artifacts, per contra, has traditionally been the business of the "soft" disciplines in the humanities and social sciences. The notion of "complex artificial environments" thus implies the supposition that the theories of compl- ity and self-organization, together with the mathematical formalisms and meth- ologies developed for their study, apply beyond the domain of nature. Such a s- st position raises a whole set of questions relating to the nature of 21 century cities and urbanism, to philosophical issues regarding the natural versus the artificial, to the methodological legitimacy of interdisciplinary transfer of theories and me- odologies and to the implications that entail the use of sophisticated, state-of-t- art artifacts such as virtual reality (VR) cities and environments. The three-day workshop on the study of complex artificial environments that took place on the island of San Servolo, Venice, during April 1-3, 2004, was a gathering of scholars engaged in the study of the various aspects of CAE.

Biometric System and Data Analysis - Design, Evaluation, and Data Mining (Paperback, Softcover reprint of hardcover 1st ed.... Biometric System and Data Analysis - Design, Evaluation, and Data Mining (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Ted Dunstone, Neil Yager
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

This book brings together aspects of statistics and machine learning to provide a comprehensive guide to evaluating, interpreting and understanding biometric data. It naturally leads to topics including data mining and prediction to be examined in detail. The book places an emphasis on the various performance measures available for biometric systems, what they mean, and when they should and should not be applied. The evaluation techniques are presented rigorously, however they are always accompanied by intuitive explanations. This is important for the increased acceptance of biometrics among non-technical decision makers, and ultimately the general public.

Handbook of Geometric Computing - Applications in Pattern Recognition, Computer Vision, Neuralcomputing, and Robotics... Handbook of Geometric Computing - Applications in Pattern Recognition, Computer Vision, Neuralcomputing, and Robotics (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Eduardo Bayro Corrochano
R5,724 Discovery Miles 57 240 Ships in 10 - 15 working days

Many computer scientists, engineers, applied mathematicians, and physicists use geometry theory and geometric computing methods in the design of perception-action systems, intelligent autonomous systems, and man-machine interfaces. This handbook brings together the most recent advances in the application of geometric computing for building such systems, with contributions from leading experts in the important fields of neuroscience, neural networks, image processing, pattern recognition, computer vision, uncertainty in geometric computations, conformal computational geometry, computer graphics and visualization, medical imagery, geometry and robotics, and reaching and motion planning. For the first time, the various methods are presented in a comprehensive, unified manner.

This handbook is highly recommended for postgraduate students and researchers working on applications such as automated learning; geometric and fuzzy reasoning; human-like artificial vision; tele-operation; space maneuvering; haptics; rescue robots; man-machine interfaces; tele-immersion; computer- and robotics-aided neurosurgery or orthopedics; the assembly and design of humanoids; and systems for metalevel reasoning.

Markov Random Field Modeling in Image Analysis (Paperback, Softcover reprint of hardcover 3rd ed. 2009): Stan Z. Li Markov Random Field Modeling in Image Analysis (Paperback, Softcover reprint of hardcover 3rd ed. 2009)
Stan Z. Li
R4,374 Discovery Miles 43 740 Ships in 10 - 15 working days

Markov random field (MRF) theory provides a basis for modeling contextual constraints in visual processing and interpretation. It enables us to develop optimal vision algorithms systematically when used with optimization principles. This book presents a comprehensive study on the use of MRFs for solving computer vision problems. Various vision models are presented in a unified framework, including image restoration and reconstruction, edge and region segmentation, texture, stereo and motion, object matching and recognition, and pose estimation. This third edition includes the most recent advances and has new and expanded sections on topics such as: Bayesian Network; Discriminative Random Fields; Strong Random Fields; Spatial-Temporal Models; Learning MRF for Classification. This book is an excellent reference for researchers working in computer vision, image processing, statistical pattern recognition and applications of MRFs. It is also suitable as a text for advanced courses in these areas.

Autonomous Robotic Systems - Soft Computing and Hard Computing Methodologies and Applications (Paperback, Softcover reprint of... Autonomous Robotic Systems - Soft Computing and Hard Computing Methodologies and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2003)
Changjiu Zhou, Dario Maravall, Da Ruan
R4,413 Discovery Miles 44 130 Ships in 10 - 15 working days

This book contains an edited collection of eighteen contributions on soft and hard computing techniques and their applications to autonomous robotic systems. Each contribution has been exclusively written for this volume by a leading researcher. The volume demonstrates the various ways that the soft computing and hard computing techniques can be used in different integrated manners to better develop autonomous robotic systems that can perform various tasks of vision, perception, cognition, thinking, pattern recognition, decision-making, and reasoning and control, amongst others. Each chapter of the book is self-contained and points out the future direction of research.

"It is a must reading for students and researchers interested in exploring the potentials of the fascinating field that will form the basis for the design of the intelligent machines of the future"
(Madan M. Gupta)

Pattern Recognition and Machine Intelligence - Third International Conference, PReMI 2009 New Delhi, India, December 16-20,... Pattern Recognition and Machine Intelligence - Third International Conference, PReMI 2009 New Delhi, India, December 16-20, 2009 Proceedings (Paperback, 2009 ed.)
Santanu Chaudhury, Sushmita Mitra, C. a. Murthy, P.S. Sastry, Sankar Kumar Pal
R2,979 Discovery Miles 29 790 Ships in 10 - 15 working days

This volume contains the proceedings of the third international conference on Pattern Recognition and Machine Intelligence (PReMI 2009) which was held at the Indian Institute of Technology, New Delhi, India, during December 16-20, 2009. This was the third conference in the series. The first two conferences were held in December at the Indian Statistical Institute, Kolkata in 2005 and 2007. PReMI has become a premier conference in India presenting state-of-art research findings in the areas of machine intelligence and pattern recognition. The conference is also successful in encouraging academic and industrial interaction, and in prom- ing collaborative research and developmental activities in pattern recognition, - chine intelligence and other allied fields, involving scientists, engineers, professionals, researchers and students from India and abroad. The conference is scheduled to be held every alternate year making it an ideal platform for sharing views and expe- ences in these fields in a regular manner. The focus of PReMI 2009 was soft-computing, machine learning, pattern recognition and their applications to diverse fields. As part of PReMI 2009 we had two special workshops. One workshop focused on text mining. The other workshop show-cased industrial and developmental projects in the relevant areas. Premi 2009 attracted 221 submissions from different countries across the world.

Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Paperback, Softcover reprint of... Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Pim Tuyls, Boris Skoric, Tom Kevenaar
R2,891 Discovery Miles 28 910 Ships in 10 - 15 working days

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.

Neural Information Processing - 16th International Conference, ICONIP 2009, Bangkok, Thailand, December 1-5, 2009, Proceedings,... Neural Information Processing - 16th International Conference, ICONIP 2009, Bangkok, Thailand, December 1-5, 2009, Proceedings, Part II (Paperback, 2009 ed.)
Chi Sing Leung, Min Ho Lee, Jonathan H. Chan
R4,529 Discovery Miles 45 290 Ships in 10 - 15 working days

th This two-volume set constitutes the Proceedings of the 16 International Conference on Neural Information Processing (ICONIP 2009), held in Bangkok, Thailand, during December 1-5, 2009. ICONIP is a world-renowned international conference that is held annually in the Asia-Pacific region. This prestigious event is sponsored by the Asia Pacific Neural Network Assembly (APNNA), and it has provided an annual forum for international researchers to exchange the latest ideas and advances in neural networks and related discipline. The School of Information Technology (SIT) at King Mongkut's University of Technology Thonburi (KMUTT), Bangkok, Thailand was the proud host of ICONIP 2009. The conference theme was "Challenges and Trends of Neural Information Processing," with an aim to discuss the past, present, and future challenges and trends in the field of neural information processing. ICONIP 2009 accepted 145 regular session papers and 53 special session papers from a total of 466 submissions received on the Springer Online Conference Service (OCS) system. The authors of accepted papers alone covered 36 countries and - gions worldwide and there are over 500 authors in these proceedings. The technical sessions were divided into 23 topical categories, including 9 special sessions.

Knowledge Science, Engineering and Management - Third International Conference, KSEM 2009, Vienna, Austria, November 25-27,... Knowledge Science, Engineering and Management - Third International Conference, KSEM 2009, Vienna, Austria, November 25-27, 2009, Proceedings (Paperback, 2009 ed.)
Dimitris Karagiannis, Zhi Jin
R1,578 Discovery Miles 15 780 Ships in 10 - 15 working days

Following two successful events in Guilin, People's Republic of China (KSEM 2006) and in Melbourne, Australia (KSEM 2007) the third event in this conference series was held for the first time in Europe, namely, in Vienna, Austria. KSEM 2009 aimed to be a communication platform and meeting ground for research on knowledge science, engineering and management, attracting high-quality, state-of-the-art publications from all over the world. It offers an exceptional opportunity for presenting original work, technological advances, practical problems and concerns of the research community. The importance of studying "knowledge" from different viewpoints such as science, engineering and management has been widely acknowledged. The accelerating pace of the "Internet age" challenges organizations to compress communication and innovation cycles to achieve a faster return on investment for knowledge. Thus, next-generation business solutions must be focused on supporting the creation of value by adding knowledge-rich components as an integral part to the work process. Therefore, an integrated approach is needed, which combines issues from a large array of knowledge fields such as science, engineering and management. Based on the reviews by the members of the Program Committee and the additional reviewers, 42 papers were selected for this year's conference. Additionally, two discussion panels dealing with "Knowware: The Third Star after Hardware and Software" and "Required Knowledge for Delivering Services" took place under the auspices of the conference. The papers and the discussions covered a great variety of approaches of knowledge science, management and engineering, thus making KSEM a unique conference.

Combinatorial Image Analysis - 13th International Workshop, IWCIA 2009, Playa del Carmen, Mexico, November 24-27, 2009,... Combinatorial Image Analysis - 13th International Workshop, IWCIA 2009, Playa del Carmen, Mexico, November 24-27, 2009, Proceedings (Paperback, 2009 ed.)
Petra Wiederhold, Reneta P. Barneva
R1,569 Discovery Miles 15 690 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 13th International Workshop on Combinatorial Image Analysis, IWCIA 2009, held in Playa del Carmen, Mexico, in November 2009.

The 32 revised full papers and one invited paper presented were carefully reviewed and selected from 70 initial submissions. The papers are organized in topical sections on digital geometry: curves, straightness, convexity, geometric transformations, metrics, distance transforms and skeletons, segmentation, thinning, skeletonization, image representation, processing, analysis, reconstruction and recognition, digital tomography, image models based on geometry, combinatorics, arithmetics, algebra, mathematical morphology, topology and grammars, as well as digital topology and its applications to image modeling and analysis.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mobile Networks for Biometric Data…
Massimo Conti, Natividad Martinez Madrid, … Hardcover R6,721 Discovery Miles 67 210
Deep Biometrics
Richard Jiang, Chang-Tsun Li, … Hardcover R3,651 Discovery Miles 36 510
Contactless 3D Fingerprint…
Ajay Kumar Hardcover R1,506 Discovery Miles 15 060
Smart Assisted Living - Toward An Open…
Feng Chen, Rebeca I. Garcia-Betances, … Hardcover R3,658 Discovery Miles 36 580
Handbook of Medical Image Computing and…
S. Kevin Zhou, Daniel Rueckert, … Hardcover R7,050 R4,861 Discovery Miles 48 610
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain Hardcover R8,638 Discovery Miles 86 380
Biometric Security and Privacy…
Richard Jiang, Somaya Al-Maadeed, … Hardcover R5,137 Discovery Miles 51 370
Machine Learning and Pattern Recognition…
Jahan B. Ghasemi Paperback R4,171 Discovery Miles 41 710
Advances in Face Image Analysis…
Yu-jin Zhang Hardcover R6,678 Discovery Miles 66 780
Human Recognition in Unconstrained…
Maria De Marsico, Michele Nappi, … Hardcover R2,928 R2,749 Discovery Miles 27 490

 

Partners