Face -- Texture Features in Facial Image Analysis -- Enhance ASMs Based on AdaBoost-Based Salient Landmarks Localization and Confidence-Constraint Shape Modeling -- Face Authentication Using One-Class Support Vector Machines -- A Novel Illumination Normalization Method for Face Recognition -- Using Score Normalization to Solve the Score Variation Problem in Face Authentication -- Gabor Feature …
Conceptual Track -- Morphogenesis and Development -- Robotics and Autonomous Agents -- Evolutionary Computation and Theory -- Cellular Automata -- Models of Biological Systems and Their Applications -- Ant Colony and Swarm Systems -- Evolution of Communication -- Simulation of Social Interactions -- Self-replication -- Artificial Chemistry -- Posters.TheArti?cialLifetermappearedmorethan20yearsa…
IT management: The basis -- The basis of the field -- Supplying IT products and services within an architecture -- Traditional IT management: organizing demand and supply -- Task focussed and simultaneous process-focussed supply of facilities -- The demand-side: functional management (using the method BiSL) -- The supply-side: application management (using the method ASL) -- The supply-side: ex…
Theory: Probabilistic Classifiers -- Theory: Generalization Bounds -- Theory: Semi-Supervised Learning -- Algorithm: Maximum Likelihood Minimum Entropy HMM -- Algorithm: Margin Distribution Optimization -- Algorithm: Learning the Structure of Bayesian Network Classifiers -- Application: Office Activity Recognition -- Application: Multimodal Event Detection -- Application: Facial Expression Reco…
High Performance Computing and Algorithms -- Computer Modeling and Simulations -- Biological and Medical Informatics -- Data and Information Sciences -- Computational Graphics and Visualization.The 2004 International Symposium on Computational and Information Sciences (CIS 2004) aimed at bringing researchers in the area of computational and - formation sciences together to exchange new ideas an…
Topology and Calculus -- Limits and Topology -- Differentiability -- Inverse and Implicit Functions -- Integration -- The Fundamental Theorem of Calculus and Fubini’s Theorem -- Vector Fields -- Fixpoints -- Main Theorem of ODEs -- Third Advanced Topic -- Selected Higher Subjects -- Categories -- Splines -- Fourier Theory -- Wavelets -- Fractals -- Neural Networks -- Probability Theory -- Lam…
Combining Biometric Evidence for Person Authentication -- Combining Biometric Evidence for Person Authentication -- Biometric Gait Recognition -- A Tutorial on Fingerprint Recognition -- Spiral Topologies for Biometric Recognition -- Statistical Learning Approaches with Application to Face Detection -- Hand Detection by Direct Convexity Estimation -- Template-Based Hand Detection and Tracking -…
Keynote Speech -- Research Issues in Adapting Computing to Small Devices -- Mobile Context-Aware Systems – Linking the Physical and Digital World -- Architecture -- A Data Transformations Based Approach for Optimizing Memory and Cache Locality on Distributed Memory Multiprocessors -- A Fetch Policy Maximizing Throughput and Fairness for Two-Context SMT Processors -- A Loop Transformation Usin…
Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- Ge…
Towards Generic Pattern Mining -- Conceptual Exploration of Semantic Mirrors -- Towards a Formal Concept Analysis Approach to Exploring Communities on the World Wide Web -- Automatic Selection of Noun Phrases as Document Descriptors in an FCA-Based Information Retrieval System -- Combining Spatial and Lattice-Based Information Landscapes -- Explaining the Structure of FrameNet with Concept Latt…