the proceedings contain 23 papers. the special focus in this conference is on Linked Data and Knowledge Graph. the topics include: A new model to compute semantic similarity from multi-ontology;linked data platform D2...
ISBN:
(纸本)9783642540240
the proceedings contain 23 papers. the special focus in this conference is on Linked Data and Knowledge Graph. the topics include: A new model to compute semantic similarity from multi-ontology;linked data platform D2R+;an ontology-based approach to extracting semantic relations from descriptive text;linking biomedical data for disease-SNP relation discovery;graph compression strategies for instance-focused semantic mining;searching semantic associations based on virtual document;a semantic web information integration system based on ontology-mapping and multilevel query interface;promoting integrated social and medical care through semantic integration and context visualization;a subject partitioning based SPARQL query engine and its NoSQL implementation;multi-criteria axiom ranking based on analytic hierarchy process;learning domain-specific ontologies from the web;effective chinese relation extraction by sentence rolling and candidate ranking;toward ontology representation and reasoning for news;approach for automatic construction of ontology based on medication guide;evaluating article quality and editor reputation in Wikipedia;ontology construction in tea pest domain and integration of pattern-based debugging approach into RaDON.
Facial aging effects can be perceived in two main forms;the first one is the growth related transformations and the second one is the textural variations. therefore, in order to generate an efficient age classifier, b...
详细信息
In this paper, we present a novel formulation of Random Forests, which introduces order statistics into the splitting functions of nodes. Order statistics, in general, neglect the absolute values of single feature dim...
详细信息
ISBN:
(数字)9783642406027
ISBN:
(纸本)9783642406010;9783642406027
In this paper, we present a novel formulation of Random Forests, which introduces order statistics into the splitting functions of nodes. Order statistics, in general, neglect the absolute values of single feature dimensions and just consider the ordering of different feature dimensions. Recent works showed that such statistics have more discriminative power than just observing single feature dimensions. However, they were just used as a preprocessing step, transforming data into a higher dimensional feature space, or were limited to just consider two feature dimensions. In contrast, we integrate order statistics into the Random Forest framework, and thus avoid explicit mapping onto higher dimensional spaces. In this way, we can also exploit more than two feature dimensions, resulting in increased discriminative power. Moreover, we show that this idea can easily be extended for the popular Hough Forest framework. the experimental results demonstrate that using splitting functions building on order statistics can improve both, the performance for classification tasks (using Random Forests) and for object detection (using Hough Forests).
In this paper, we propose a novel approach to track multiple objects across non-overlapping cameras, which aims at giving each object a unique label during its appearance in the whole multi-camera system. We formulate...
详细信息
To handle high dimensional variables in real world, especially multimedia data, dimension reduction techniques provide effective solutions for feature selection which makes the problem easy to deal in a lower dimensio...
详细信息
the present work describes a framework for morphological characterization of galaxies based on the Spectral Graph Wavelet Transform. A galaxy image is sampled with a number of points randomly chosen, whose Delaunay tr...
详细信息
ISBN:
(纸本)9780769550831
the present work describes a framework for morphological characterization of galaxies based on the Spectral Graph Wavelet Transform. A galaxy image is sampled with a number of points randomly chosen, whose Delaunay triangulation results in an arbitrary graph. the average intensity value in a 5x5 vicinity of a pixel related to a graph vertex is assigned to the corresponding graph vertex. A weight inversely proportional to the photometric distance between each pair of vertices is assigned to the respective graph edge. the Spectral Graph Wavelet Transform is computed from this weighted graph with real-valued vertices yielding a high-dimensional feature vector, which is reduced to a two dimensional vector through Principal Component Analysis. the proposed framework has been assessed through two case studies, namely, the case study of analyzing (i) 2D binary images from shapes and preliminary results of (ii) 2D gray tone images from galaxies. the obtained results imply the suitability of this framework for the characterization of galaxies images.
Proxy re-encryption (PRE) is an attractive paradigm, which gives good solutions to the problem of delegation of decryption rights. In proxy re-encryption, a semi-trusted proxy translates a ciphertext for Alice into a ...
详细信息
ISBN:
(数字)9783642412271
ISBN:
(纸本)9783642412271;9783642412264
Proxy re-encryption (PRE) is an attractive paradigm, which gives good solutions to the problem of delegation of decryption rights. In proxy re-encryption, a semi-trusted proxy translates a ciphertext for Alice into a ciphertext of the same plaintext for Bob, without learning any information of the underlying message. As far as we know, previous PRE schemes are mainly in traditional public key infrastructure or identity-based cryptography, thus they suffer from certificate management problem or key escrow problem in practice. In order to solve these practical problems, we aim at constructing certificateless proxy re-encryption (CL-PRE) schemes. In this paper, we first introduce a security definition against (replayable) chosen ciphertext attack (CCA) for certificateless proxy re-encryption. In our security model, the adversary is allowed to adaptively corrupt users (in a specific pattern). then, we give some evidence that it is not easy to construct a secure CL-PRE. Actually, we present an attack to the chosen plaintext secure CL-PRE scheme proposed by Xu et al. [1]. We also show a novel generic construction for certificateless public key encryption (CL-PKE) can not be trivially adapted to CL-PRE by giving an attack to this generic construction. Finally, we present an efficient CL-PRE scheme and prove its security in the random oracle model based on well-known assumptions.
Gender classification is one of the challenging problems in computervision. Many interactive applications need to exactly recognize human genders. In this paper, we are carrying out some experiments to classify the h...
详细信息
Spatial information in images is considered to be of great importance in the process of object recognition. Recent studies show that human's classification accuracy might drop dramatically if the spatial informati...
详细信息
the paper provides a summary of the contributions to the industrial session at ICIAP2013, describing a few practical applications of Video Analysis, in the Surveillance and Security field. the session has been organiz...
详细信息
ISBN:
(纸本)9783642411847;9783642411830
the paper provides a summary of the contributions to the industrial session at ICIAP2013, describing a few practical applications of Video Analysis, in the Surveillance and Security field. the session has been organized to stimulate an open discussion within the scientific community of CVPR on new emerging research areas which deserve particular attention, and may contribute to the improvement of industrial applications in the near future.
暂无评论