This book constitutes the refereed proceedings of the 8th Chinese Conference on Biometric Recognition, CCBR 2013, held in Jinan, China, in November 2013. The 57 revised full papers presented were carefully reviewed an...
详细信息
ISBN:
(数字)9783319029610
ISBN:
(纸本)9783319029603
This book constitutes the refereed proceedings of the 8th Chinese Conference on Biometric Recognition, CCBR 2013, held in Jinan, China, in November 2013. The 57 revised full papers presented were carefully reviewed and selected from among 100 submissions. The papers address the problems in face, fingerprint, palm print, vein biometrics, iris and ocular biometrics, behavioral biometrics and other related topics, and contribute new ideas to research and development of reliable and practical solutions for biometric authentication.
The two-volume set LNCS 6987 and 6988 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2011, held in Taiyuan, China, in September 2011. The 112 revised f...
详细信息
ISBN:
(数字)9783642239823
ISBN:
(纸本)9783642239816
The two-volume set LNCS 6987 and 6988 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2011, held in Taiyuan, China, in September 2011. The 112 revised full papers presented were carefully reviewed and selected from 472 submissions. The second volume includes 56 papers organized in the following topical sections: management information systems; semantic Web and ontologies; Web content mining; Web information classification; Web information extraction; Web intelligence; Web interfaces and applications; Web services and e-learning; and XML and semi-structured data.
This LNCS volume contains the papers presented at SEAL 2008, the 7th Int- nationalConference on Simulated Evolutionand Learning,held December 7–10, 2008, in Melbourne, Australia. SEAL is a prestigious international c...
详细信息
ISBN:
(数字)9783540896944
ISBN:
(纸本)9783540896937
This LNCS volume contains the papers presented at SEAL 2008, the 7th Int- nationalConference on Simulated Evolutionand Learning,held December 7–10, 2008, in Melbourne, Australia. SEAL is a prestigious international conference series in evolutionary computation and learning. This biennial event was ?rst held in Seoul, Korea, in 1996, and then in Canberra, Australia (1998), Nagoya, Japan (2000), Singapore (2002), Busan, Korea (2004), and Hefei, China (2006). SEAL 2008 received 140 paper submissions from more than 30 countries. After a rigorous peer-review process involving at least 3 reviews for each paper (i.e., over 420 reviews in total), the best 65 papers were selected to be presented at the conference and included in this volume, resulting in an acceptance rate of about 46%. The papers included in this volume cover a wide range of topics in simulated evolution and learning: from evolutionarylearning to evolutionary optimization, from hybrid systems to adaptive systems, from theoretical issues to real-world applications. They represent some of the latest and best research in simulated evolution and learning in the world.
This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel Computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was ...
详细信息
ISBN:
(数字)9783540301417
ISBN:
(纸本)9783540233886
This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel Computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was to establish an international forum for engineers and scientists to present their ideas and experiences in network and parallel computing. A total of 338 submissions were received in response to the call for papers. These papers werefrom Australia, Brazil,Canada,China, Finland, France, G- many, Hong Kong, India, Iran, Italy, Japan, Korea, Luxemburg, Malaysia, N- way, Spain, Sweden, Taiwan, UK, and USA. Each submission was sent to at least three *** paper was judged according to its originality,inno- tion, readability, and relevance to the expected audience. Based on the reviews received, a total of 69 papers were accepted to be included in the proceedings. Among the 69 papers, 46 were accepted as full papers and were presented at the *** accepted23papersasshortpapers;eachofthesepaperswas given an opportunity to have a brief presentation at the conference, followed by discussions in a poster session. Thus, due to the limited scope and time of the conference and the high number of submissions received, only 20% of the total submissions were included in the ?nal program.
st This volume contains the proceedings of two conferences held as part of the 21 IFIP World computer Congress in Brisbane, Australia, 20–23 September 2010. th The first part of the book presents the proceedings of D...
详细信息
ISBN:
(数字)9783642152344
ISBN:
(纸本)9783642152337;9783642422928
st This volume contains the proceedings of two conferences held as part of the 21 IFIP World computer Congress in Brisbane, Australia, 20–23 September 2010. th The first part of the book presents the proceedings of DIPES 2010, the 7 IFIP Conference on Distributed and Parallel Embedded Systems. The conference, int- duced in a separate preface by the Chairs, covers a range of topics from specification and design of embedded systems through to dependability and fault tolerance. rd The second part of the book contains the proceedings of BICC 2010, the 3 IFIP Conference on Biologically-Inspired Collaborative Computing. The conference is concerned with emerging techniques from research areas such as organic computing, autonomic computing and self-adaptive systems, where inspiraton for techniques - rives from exhibited behaviour in nature and biology. Such techniques require the use of research developed by the DIPES community in supporting collaboration over multiple systems. We hope that the combination of the two proceedings will add value for the reader and advance our related work.
Visual Concept Implantation (VCI) is essential in text-to-image fields. While VCI methods in diffusion models have matured, Visual Concept Disentanglement (VCD) remains an unexplored area. VCD involves analyzing Promp...
详细信息
Visual Concept Implantation (VCI) is essential in text-to-image fields. While VCI methods in diffusion models have matured, Visual Concept Disentanglement (VCD) remains an unexplored area. VCD involves analyzing Prompt Spaces trained in VCI to produce disentangled SubPrompts or SubCones for exploring interpretability. However, challenges arise due to Prompt Space design complexity and feature information extraction. We propose Picasso, a unified framework for VCD in diffusion models (DM). Our contributions include: for performance evaluation: Transforming VCD in DM into a regular clustering task by Visualization based on SubCones (VbSC); for unified framework design: Picasso processes diverse Prompt Spaces using spatially clusterable features; for prompt space exploration: Introducing a temporal-spatial SOTA Prompt Design subset based on temporal features. Our method provides a feasible mechanism for VCD in DM. Through functional and interpretability validation methods, we will comprehensively evaluate the effectiveness of our proposed method in visual concept implantation tasks and verify the correctness of the parameter space design principles. Picasso will be released at https://***/our_picasso.
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were ca...
详细信息
ISBN:
(数字)9783642332722
ISBN:
(纸本)9783642332715
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
Graph pattern mining is essential for deciphering complex networks. In the real world, graphs are dynamic and evolve over time, necessitating updates in mining patterns to reflect these changes. Traditional methods us...
详细信息
Graph pattern mining is essential for deciphering complex networks. In the real world, graphs are dynamic and evolve over time, necessitating updates in mining patterns to reflect these changes. Traditional methods use fine-grained incremental computation to avoid full re-mining after each update, which improves speed but often overlooks potential gains from examining inter-update interactions holistically, thus missing out on overall efficiency *** this paper, we introduce Cheetah, a dynamic graph mining system that processes updates in a coarse-grained manner by leveraging exploration domains. These domains exploit the community structure of real-world graphs to uncover data reuse opportunities typically missed by existing approaches. Exploration domains, which encapsulate extensive portions of the graph relevant to updates, allow multiple updates to explore the same regions efficiently. Cheetah dynamically constructs these domains using a management module that identifies and maintains areas of redundancy as the graph changes. By grouping updates within these domains and employing a neighbor-centric expansion strategy, Cheetah minimizes redundant data accesses. Our evaluation of Cheetah across five real-world datasets shows it outperforms current leading systems by an average factor of 2.63 ×.
暂无评论