Invited Talks -- The Virtue of Reward: Performance, Reinforcement and Discovery in Case-Based Reasoning -- Learning to Optimize Plan Execution in Information Agents -- Cased-Based Reasoning by Human Experts -- Scientific Papers -- Learning to Win: Case-Based Plan Selection in a Real-Time Strategy Game -- An Ensemble of Case-Based Classifiers for High-Dimensional Biological Domains -- Language G…
to Software Product Line Engineering -- A Framework for Software Product Line Engineering -- Overview of the Example Domain: Home Automation -- Product Line Variability -- Principles of Variability -- Documenting Variability in Requirements Artefacts -- Documenting Variability in Design Artefacts -- Documenting Variability in Realisation Artefacts -- Documenting Variability in Test Artefacts --…
to India -- First Impressions -- Indian History and Religion -- Contemporary Indian Politics -- Culture and Food -- Domestic Travel -- Security Concerns -- The Outsourcing Industry in India -- The Outsourcing Drivers -- The Major Industry Players in India -- Ownership Models and Partnership -- The Major Outsourcing Locations -- Industry Associations and Research Bodies -- How to Organise the Ou…
Invited Papers -- Pattern Recognition for Computer Network Security -- Computer Vision for Augmented Reality and Augmented Environments -- Low and Middle Level Processing -- Image Segmentation -- Feature Extraction and Image Analysis -- Graphs -- Shape and Motion -- Image Modelling and Computer Graphics -- Image Communication, Coding and Security -- Computer Architectures, Technologies and Tool…
Foundational Topics in Medical Informatics -- Knowledge Management, Data Mining, and Text Mining in Medical Informatics -- Mapping Medical Informatics Research -- Bioinformatics Challenges and Opportunities -- Managing Information Security and Privacy in Healthcare Data Mining -- Ethical and Social Challenges of Electronic Health Information -- Information and Knowledge Management -- Medical Co…
Adaptive Business Intelligence Based on Evolution Strategies: Some Application Examples of Self-Adaptive Software -- Extending the Boundaries of Design Optimization by Integrating Fast Optimization Techniques with Machine Code Based, Linear Genetic Programming -- Evolutionary Optimization of Approximating Triangulations for Surface Reconstruction from Unstructured 3D Data -- An Evolutionary Alg…
Face Detection -- Modeling Facial Shape and Appearance -- Parametric Face Modeling and Tracking -- Illumination Modeling for Face Recognition -- Facial Skin Color Modeling -- Color Plates for Chapters 6 and 15 -- Face Recognition in Subspaces -- Face Tracking and Recognition from Video -- Face Recognition Across Pose and Illumination -- Morphable Models of Faces -- Facial Expression Analysis --…
Management Summary -- At a Glance — Competing through Knowledge Networks -- About this Handbook -- Building Blocks -- Storyboard — Setting Up Knowledge Networks -- Summary and Action Plan.The concepts and theories of knowledge management and networks are meanwhile well documented. Yet there are few, if any, guidelines on how to implement knowledge management within an organization, especial…
Theories and Paradigms -- Identifying Hypermedia Browsing Strategies -- Simulations as Mental Tools for Network-Based Group Learning -- E-training or E-learning? -- Pedagogical Models in Network-Based Education -- The Effects of IT-Based Training on Employees Uptake of New Technologies in the Work-Place -- Focus Group Report: Mobility and Education -- Programs and Curricula -- ‘Anybody Out Th…
Visual Data Formats -- Cryptography Primer -- Application Scenarios for the Encryption of Visual Data -- Image and Video Encryption -- Conclusions.Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume intro…