You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 8th Pacific Rim Conference on Multimedia, PCM 2007, held in Hong Kong, China, in December 2007. The 73 revised full papers and 21 revised posters presented were carefully reviewed and selected from 247 submissions. The papers are organized in topical sections on image classification and retrieval, the AVS china national standard - technology, applications and products, human face and action recognition, and many more topics.
Search algorithms aim to find solutions or objects with specified properties and constraints in a large solution search space or among a collection of objects. A solution can be a set of value assignments to variables that will satisfy the constraints or a sub-structure of a given discrete structure. In addition, there are search algorithms, mostly probabilistic, that are designed for the prospective quantum computer. This book demonstrates the wide applicability of search algorithms for the purpose of developing useful and practical solutions to problems that arise in a variety of problem domains. Although it is targeted to a wide group of readers: researchers, graduate students, and practitioners, it does not offer an exhaustive coverage of search algorithms and applications. The chapters are organized into three parts: Population-based and quantum search algorithms, Search algorithms for image and video processing, and Search algorithms for engineering applications.
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hiding; forensics; watermarking; anonymizing and plate recognition.
The two-volume proceedings LNCS 7087 + 7088 constitute the proceedings of the 5th Pacific Rim Symposium, PSIVT 2011, held in Gwangju, Korea, in November 2011. The total of 71 revised papers was carefully reviewed and selected from 168 submissions. The topics covered are: image/video coding and transmission; image/video processing and analysis; imaging and graphics hardware and visualization; image/video retrieval and scene understanding; biomedical image processing and analysis; biometrics and image forensics; and computer vision applications.
The International Conference on Intelligent Computing (ICIC) was set up as an annual forum dedicated to emerging and challenging topics in the various aspects of advances in computational intelligence fields, such as artificial intelligence, machine learning, bioinformatics, and computational biology, etc. The goal of this conference was to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions related to the multifaceted aspects of intelligent computing. This book constitutes the proceedings of the International Conference on Intelligent Computing (ICIC 2005), held in Hefei, Anhui, China, during August 23–26, 2005. ICIC 2005 r...
The two-volume set LNCS 7732 and 7733 constitutes the thoroughly refereed proceedings of the 19th International Conference on Multimedia Modeling, MMM 2012, held in Huangshan, China, in January 2013. The 30 revised regular papers, 46 special session papers, 20 poster session papers, and 15 demo session papers, and 6 video browser showdown were carefully reviewed and selected from numeroues submissions. The two volumes contain papers presented in the topical sections on multimedia annotation I and II, interactive and mobile multimedia, classification, recognition and tracking I and II, ranking in search, multimedia representation, multimedia systems, poster papers, special session papers, demo session papers, and video browser showdown.
AUTONOMOUS VEHICLES The companion to Autonomous Vehicles Volume 1: Using Machine Intelligence, this second volume in the two-volume set covers intelligent techniques utilized for designing, controlling, and managing vehicular systems based on advanced algorithms of computing like machine learning, artificial intelligence, data analytics, and Internet of Things (IoT) with prediction approaches to avoid accidental damages, security threats, and theft. Besides communicating with other vehicles, self-driving cars connected to a 5G network will also be able to communicate with different infrastructure elements that make up our roads and other transportation and communication systems. Similarly, a...