Adaptive Business Intelligence Based on Evolution Strategies: Some Application Examples of Self-Adaptive Software -- Extending the Boundaries of Design Optimization by Integrating Fast Optimization Techniques with Machine Code Based, Linear Genetic Programming -- Evolutionary Optimization of Approximating Triangulations for Surface Reconstruction from Unstructured 3D Data -- An Evolutionary Alg…
Face Detection -- Modeling Facial Shape and Appearance -- Parametric Face Modeling and Tracking -- Illumination Modeling for Face Recognition -- Facial Skin Color Modeling -- Color Plates for Chapters 6 and 15 -- Face Recognition in Subspaces -- Face Tracking and Recognition from Video -- Face Recognition Across Pose and Illumination -- Morphable Models of Faces -- Facial Expression Analysis --…
Visual Data Formats -- Cryptography Primer -- Application Scenarios for the Encryption of Visual Data -- Image and Video Encryption -- Conclusions.Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume intro…
Regular Papers -- A Treatise on Rough Sets -- On Optimization of Decision Trees -- Dealing with Missing Data: Algorithms Based on Fuzzy Set and Rough Set Theories -- Characteristic Relations for Incomplete Data: A Generalization of the Indiscernibility Relation -- Supervised Learning in the Gene Ontology Part I: A Rough Set Framework -- Supervised Learning in the Gene Ontology Part II: A Bottom…
Motivation and Introduction -- Quality of Human-Machine Interaction over the Phone -- Assessment and Evaluation Methods -- Speech Recognition Performance over the Phone -- Quality of Synthesized Speech over the Phone -- Quality of Spoken Dialogue Systems -- Final Conclusions and Outlook.Quality of Telephone-Based Spoken Dialogue Systems is a systematic overview of assessment, evaluation, and pr…
Channel Codes -- Direct-Sequence Systems -- Frequency-Hopping Systems -- Code Synchronization -- Fading of Wireless Communications -- Code-Division Multiple Access -- Detection of Spread-Spectrum Signals.Originally adopted in military networks as a means of ensuring secure communication when confronted with the threats of jamming and interception, spread-spectrum systems are now the core of com…
Modern Antennas, 2nd edition provides a complete and rigorous treatment of the theory and practice of modern antenna design and use. Written by a team of experienced engineers, the text is presented in a simple and understandable manner which guides the reader progressively through the stages of the design process. The book is aimed at practising engineers and graduate-level students, and inclu…
A Study of Non-smooth Convex Flow Decomposition -- Denoising Tensors via Lie Group Flows -- Nonlinear Inverse Scale Space Methods for Image Restoration -- Towards PDE-Based Image Compression -- Color Image Deblurring with Impulsive Noise -- Using an Oriented PDE to Repair Image Textures -- Image Cartoon-Texture Decomposition and Feature Selection Using the Total Variation Regularized L 1 Functi…
Image Segmentation -- Image and Video Processing and Analysis -- Image and Video Coding -- Shape and Matching -- Image Description and Recognition -- Image Retrieval and Indexing -- 3D Imaging -- Morphology -- Colour Analysis -- Texture Analysis -- Motion Analysis -- Tracking -- Biomedical Applications -- Face Recognition and Biometrics -- Image Secret Sharing -- Single-Sensor Imaging -- Real-T…
Iris -- Face I (Short) -- Finger-I (Short) -- Face-I -- Fingerprint -- Security and Smartcard -- Short Oral -- Short Oral-4 -- Fusion -- Multi-modal -- 50 – 5:50 Oral-7 (Palm and Finger Surface) -- Speaker and Gait -- Face II -- Poster I -- Poster II.This book constitutes the refereed proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication, AV…