The two volume set LNCS 5506 and LNCS 5507 constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Neural Information Processing, ICONIP 2008, held in Auckland, New Zeal...
详细信息
ISBN:
(数字)9783642030406
ISBN:
(纸本)9783642030390
The two volume set LNCS 5506 and LNCS 5507 constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Neural Information Processing, ICONIP 2008, held in Auckland, New Zealand, in November 2008. The 260 revised full papers presented were carefully reviewed and selected from numerous ordinary paper submissions and 15 special organized sessions. 116 papers are published in the first volume and 112 in the second volume. The contributions deal with topics in the areas of data mining methods for cybersecurity, computational models and their applications to machine learning and pattern recognition, lifelong incremental learning for intelligent systems, application of intelligent methods in ecological informatics, pattern recognition from real-world information by svm and other sophisticated techniques, dynamics of neural networks, recent advances in brain-inspired technologies for robotics, neural information processing in cooperative multi-robot systems.
With the emergence of edge computing, there’s a growing need for advanced technologies capable of real-time, efficient processing of complex data on edge devices, particularly in mobile health systems handling pathol...
详细信息
With the emergence of edge computing, there’s a growing need for advanced technologies capable of real-time, efficient processing of complex data on edge devices, particularly in mobile health systems handling pathological images. On edge computing devices, the lightweighting of models and reduction of computational requirements not only save resources but also increase inference speed. Although many lightweight models and methods have been proposed in recent years, they still face many common challenges. This paper introduces a novel convolution operation, Dynamic Scalable Convolution (DSC), which optimizes computational resources and accelerates inference on edge computing devices. DSC is shown to outperform traditional convolution methods in terms of parameter efficiency, computational speed, and overall performance, through comparative analyses in computer vision tasks like image classification and semantic segmentation. Experimental results demonstrate the significant potential of DSC in enhancing deep neural networks, particularly for edge computing applications in smart devices and remote healthcare, where it addresses the challenge of limited resources by reducing computational demands and improving inference speed. By integrating advanced convolution technology and edge computing applications, DSC offers a promising approach to support the rapidly developing mobile health field, especially in enhancing remote healthcare delivery through mobile multimedia communication.
Multi-modal sarcasm detection involves determining whether a given multi-modal input conveys sarcastic intent by analyzing the underlying sentiment. Recently, vision large language models have shown remarkable success...
详细信息
Multi-modal sarcasm detection involves determining whether a given multi-modal input conveys sarcastic intent by analyzing the underlying sentiment. Recently, vision large language models have shown remarkable success on various of multi-modal tasks. Inspired by this, we systematically investigate the impact of vision large language models in zero-shot multi-modal sarcasm detection task. Furthermore, to capture different perspectives of sarcastic expressions, we propose a multi-view agent framework, S3 Agent, designed to enhance zero-shot multi-modal sarcasm detection by leveraging three critical perspectives: superficial expression, semantic information, and sentiment expression. Our experiments on the MMSD2.0 dataset, which involves six models and four prompting strategies, demonstrate that our approach achieves state-of-the-art performance. Our method achieves an average improvement of 13.2% in accuracy. Moreover, we evaluate our method on the text-only sarcasm detection task, where it also surpasses baseline approaches.
The recent breakthrough in wireless power transfer technology enables power to be delivered between transceivers, which is quite helpful for sensor-cloud systems. Traditional charging schemes are only suitable for sta...
详细信息
The recent breakthrough in wireless power transfer technology enables power to be delivered between transceivers, which is quite helpful for sensor-cloud systems. Traditional charging schemes are only suitable for static sensors, while the issue of charging mobile sensors is ignored. In this paper, we make the first attempt to serve mobile sensors in the sensor-cloud systems in a “chasing” way, where a mobile charger can chase mobile sensors to replenish them. We formalize the charging utility MAximization Problem for dynamic sensors with a mobile charger (MAP) and propose a ChaseCharge algorithm based on RNN to solve it. Theoretical analyses are presented to explore the features of the proposed scheme. We carry out simulations, and the results show that the performance of our algorithm outperforms comparison algorithms by 33% in utility on average. Test-bed experiments are conducted to validate the applicability of the proposed scheme in oceanic monitoring applications.
This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues f...
详细信息
ISBN:
(数字)9783540377528
ISBN:
(纸本)9783540377504
This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues from previous events held in Zaragoza (2004) and Copenhagen (2005), and maintains the aim of bringing together academic researchers and industry developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Kraków to participate and debate the new emerging advances in this area. The conference programme included two keynote presentations, one panel session and eight technical papers sessions. The keynote speeches were delivered by Jeremy Ward from Symantec EMEA on the topic of “Building the Information Assurance Community of Purpose”, and by Günter Karjoth from IBM Research - Zurich, with a talk entitled “Privacy Practices and Economics –– From Privacy Policies to Privacy SLAs. ” The subject of the panel discussion was “Is Security Without Trust Feasible?” chaired by Leszek T. Lilien from Western Michigan University, USA. The reviewed paper sessions covered a broad range of topics, from access control models to security and risk management, and from privacy and identity management to security protocols. The conference attracted 70 submissions, each of which was assigned to four referees for review. The Programme Committee ultimately accepted 24 papers for inclusion, which were revised based upon comments from their reviews.
This book covers the new topic of GPU computing with many applications involved, taken from diverse fields such as networking, seismology, fluid mechanics, nano-materials, data-mining , earthquakes ,mantle convection,...
详细信息
ISBN:
(数字)9783642164057
ISBN:
(纸本)9783642164040;9783662506912
This book covers the new topic of GPU computing with many applications involved, taken from diverse fields such as networking, seismology, fluid mechanics, nano-materials, data-mining , earthquakes ,mantle convection, visualization. It will show the public why GPU computing is important and easy to use. It will offer a reason why GPU computing is useful and how to implement codes in an everyday situation.
暂无评论