You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Person re-identification is the problem of associating observations of targets in different non-overlapping cameras. Most of the existing learning-based methods have resulted in improved performance on standard re-identification benchmarks, but at the cost of time-consuming and tediously labeled data. Motivated by this, learning person re-identification models with limited to no supervision has drawn a great deal of attention in recent years. In this book, we provide an overview of some of the literature in person re-identification, and then move on to focus on some specific problems in the context of person re-identification with limited supervision in multi-camera environments. We expect t...
The eight-volume set LNCS 12901, 12902, 12903, 12904, 12905, 12906, 12907, and 12908 constitutes the refereed proceedings of the 24th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2021, held in Strasbourg, France, in September/October 2021.* The 531 revised full papers presented were carefully reviewed and selected from 1630 submissions in a double-blind review process. The papers are organized in the following topical sections: Part I: image segmentation Part II: machine learning - self-supervised learning; machine learning - semi-supervised learning; and machine learning - weakly supervised learning Part III: machine learning - advances in m...
d104ure analysis is an important generic research area of machine vision. The potential areas of application include biomedical image analysis, industrial inspection, analysis of satellite or aerial imagery, content-based retrieval from image databases, document analysis, biometric person authentication, scene analysis for robot navigation, texture synthesis for computer graphics and animation, and image coding. d104ure analysis has been a topic of intensive research for over three decades, but the progress has been very slow.A workshop on ?d104ure Analysis in Machine Vision? was held at the University of Oulu, Finland, in 1999, providing a forum for presenting recent research results and fo...
This book constitutes the thoroughly refereed post-proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2006, held in Guangzhou, China in November 2006. The 116 revised papers presented were carefully reviewed and selected from a total of 2078 initial submissions during two rounds of revision and improvement. The papers are organized in topical sections on bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information processing and intrusion detection, systems and security, image and signal processing, as well as pattern recognition.
This book constitutes the refereed proceedings of the 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, held in Guanzhou, China in December 2004. The 60 revised full papers presented together with 14 invited papers by internationally leading researchers were carefully reviewed and selected from 140 submissions. The papers are organized in topical sections on biometrics, best performing biometric engines, face localization, pose estimation, face recognition, 3D based methods, subspace and discriminant analysis, systems and applications, fingerprint preprocessing and minutiae extraction, fingerprint recognition and matching, fingerprint classificaiton, iris recognition, speaker recognition, and other biometric primitives.
The LNCS volume 10996 constitutes the proceedings of the 13th Chinese Conference on Biometric Recognition, held in Urumchi, China, in August 2018. The 79 regular papers presented in this book were carefully reviewed and selected from 112 submissions. The papers cover a wide range of topics such as Biometrics, Speech recognition, Activity recognition and understanding, Online handwriting recognition, System forensics, Multi-factor authentication, Graphical and visual passwords.
This book constitutes the refereed proceedings of the Fifth International AMAST Workshop on Formal Methods for Real-Time and Probabilistic Systems, ARTS '99, held in Bamberg, Germany in May 1999. The 17 revised full papers presented together with three invited contributions were carefully reviewed and selected from 33 submissions. The papers are organized in topical sections on verification of probabilistic systems, model checking for probabilistic systems, semantics of probabilistic process calculi, semantics of real-time processes, real-time compilation, stochastic process algebra, and modeling and verification of real-time systems.
This comprehensive text/reference presents a broad review of diverse domain adaptation (DA) methods for machine learning, with a focus on solutions for visual applications. The book collects together solutions and perspectives proposed by an international selection of pre-eminent experts in the field, addressing not only classical image categorization, but also other computer vision tasks such as detection, segmentation and visual attributes. Topics and features: surveys the complete field of visual DA, including shallow methods designed for homogeneous and heterogeneous data as well as deep architectures; presents a positioning of the dataset bias in the CNN-based feature arena; proposes de...
This monograph details several important advances in the direction of a practical proofs-as-programs paradigm, which constitutes a set of approaches to developing programs from proofs in constructive logic with applications to industrial-scale, complex software engineering problems. One of the books central themes is a general, abstract framework for developing new systems of programs synthesis by adapting proofs-as-programs to new contexts.
This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing.