LEADER 10903nam 22008655 450 001 996465935903316 005 20200703220442.0 010 $a1-280-38826-9 010 $a9786613566188 010 $a3-642-14980-4 024 7 $a10.1007/978-3-642-14980-1 035 $a(CKB)2670000000045037 035 $a(SSID)ssj0000446807 035 $a(PQKBManifestationID)11297753 035 $a(PQKBTitleCode)TC0000446807 035 $a(PQKBWorkID)10504320 035 $a(PQKB)11565320 035 $a(DE-He213)978-3-642-14980-1 035 $a(MiAaPQ)EBC3065744 035 $a(PPN)149024983 035 $a(EXLCZ)992670000000045037 100 $a20100828d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aStructural, Syntactic, and Statistical Pattern Recognition$b[electronic resource] $eJoint IAPR International Workshop, SSPR & SPR 2010, Cesme, Izmir, Turkey, August 18-20, 2010. Proceedings /$fedited by Edwin R. Hancock, Richard C Wilson, Terry Windeatt, Ilkay Ulusoy, Francisco Escolano 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XV, 758 p. 246 illus.) 225 1 $aImage Processing, Computer Vision, Pattern Recognition, and Graphics ;$v6218 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-14979-0 320 $aIncludes bibliographical references and index. 327 $aInvited Talks -- From Region Based Image Representation to Object Discovery and Recognition -- Learning on Manifolds -- Classification and Trees -- Structural Patterns in Complex Networks through Spectral Analysis -- Structural Descriptions -- Graph Embedding Using an Edge-Based Wave Kernel -- A Structured Learning Approach to Attributed Graph Embedding -- Machine Learning -- Combining Elimination Rules in Tree-Based Nearest Neighbor Search Algorithms -- Localized Projection Learning -- Entropy-Based Variational Scheme for Fast Bayes Learning of Gaussian Mixtures -- Structural Learning -- Learning Graph Quantization -- High-Dimensional Spectral Feature Selection for 3D Object Recognition Based on Reeb Graphs -- Dissimilarity-Based Multiple Instance Learning -- A Game Theoretic Approach to Learning Shape Categories and Contextual Similarities -- Poster Session -- A Comparison between Two Representatives of a Set of Graphs: Median vs. Barycenter Graph -- Impact of Visual Information on Text and Content Based Image Retrieval -- Automatic Traffic Monitoring from Satellite Images Using Artificial Immune System -- Graduated Assignment Algorithm for Finding the Common Labelling of a Set of Graphs -- Affinity Propagation for Class Exemplar Mining -- Guided Informative Image Partitioning -- Visual Alphabets on Different Levels of Abstraction for the Recognition of Deformable Objects -- Graph Embedding Based on Nodes Attributes Representatives and a Graph of Words Representation -- Extracting Plane Graphs from Images -- Indexing Tree and Subtree by Using a Structure Network -- Attributed Graph Matching for Image-Features Association Using SIFT Descriptors -- A Causal Extraction Scheme in Top-Down Pyramids for Large Images Segmentation -- Fast Population Game Dynamics for Dominant Sets and Other Quadratic Optimization Problems -- What Is the Complexity of a Network? The Heat Flow-Thermodynamic Depth Approach -- New Partially Labelled Tree Similarity Measure: A Case Study -- Complete Search Space Exploration for SITG Inside Probability -- Commute-Time Convolution Kernels for Graph Clustering -- Geometric Methods -- Non-Euclidean Dissimilarities: Causes and Informativeness -- Non-parametric Mixture Models for Clustering -- Structural Methods for Vision -- A Probabilistic Approach to Spectral Unmixing -- A Game-Theoretic Approach to the Enforcement of Global Consistency in Multi-view Feature Matching -- An Algorithm for Recovering Camouflage Errors on Moving People -- Clustering -- Semi-supervised Clustering Using Heterogeneous Dissimilarities -- On Consensus Clustering Validation -- Pairwise Probabilistic Clustering Using Evidence Accumulation -- Exploring the Performance Limit of Cluster Ensemble Techniques -- Contour Grouping by Clustering with Multi-feature Similarity Measure -- Poster Session -- A Psychophysical Evaluation of Texture Degradation Descriptors -- Content-Based Tile Retrieval System -- Performance Improvement in Multiple-Model Speech Recognizer under Noisy Environments -- On Feature Combination for Music Classification -- Information Theoretical Kernels for Generative Embeddings Based on Hidden Markov Models -- Dynamic Linear Combination of Two-Class Classifiers -- Large-Scale Text to Image Retrieval Using a Bayesian K-Neighborhood Model -- Maximum a Posteriori Based Kernel Classifier Trained by Linear Programming -- Improvement of the Disc Harmonic Moments Descriptor by an Exponentially Decaying Distance Transform -- Feature Level Fusion of Face and Palmprint Biometrics -- Scale and Rotation Invariant Detection of Singular Patterns in Vector Flow Fields -- Using K-NN SVMs for Performance Improvement and Comparison to K-Highest Lagrange Multipliers Selection -- Automatic Speech Segmentation Based on Acoustical Clustering -- An Efficient Iris and Eye Corners Extraction Method -- Dissimilarity-Based Methods -- An Empirical Comparison of Kernel-Based and Dissimilarity-Based Feature Spaces -- The Dissimilarity Representation as a Tool for Three-Way Data Classification: A 2D Measure -- Regularising the Ricci Flow Embedding -- Spherical Embedding and Classification -- Language -- Language Detection and Tracking in Multilingual Documents Using Weak Estimators -- Similarity Word-Sequence Kernels for Sentence Clustering -- Bayesian Adaptation for Statistical Machine Translation -- A Generative Score Space for Statistical Dialog Characterization in Social Signalling -- Multiple Classifiers -- A Modular Approach to Training Cascades of Boosted Ensembles -- A Linear Combination of Classifiers via Rank Margin Maximization -- Combination of Dichotomizers for Maximizing the Partial Area under the ROC Curve -- Graphs -- Ihara Coefficients: A Flexible Tool for Higher Order Learning -- A New Spectral Bound on the Clique Number of Graphs -- Large Sample Statistics in the Domain of Graphs -- Statistical Pattern Recognition -- Analysis of the Multi-Dimensional Scale Saliency Algorithm and Its Application to Texture Categorization -- Interactive Image Retrieval Using Smoothed Nearest Neighbor Estimates -- Kernel Fusion of Multiple Histogram Descriptors for Robust Face Recognition -- Structural Methods for OCR -- Efficient OCR Post-Processing Combining Language, Hypothesis and Error Models -- Rejection Threshold Estimation for an Unknown Language Model in an OCR Task -- A New Editing Scheme Based on a Fast Two-String Median Computation Applied to OCR. 330 $aThis volume in the Springer Lecture Notes in Computer Science (LNCS) series contains the papers presented at the S+SSPR 2010 Workshops, which was the seventh occasion that SPR and SSPR workshops have been held jointly. S+SSPR 2010 was organized by TC1 and TC2, Technical Committees of the International Association for Pattern Recognition(IAPR), andheld inCesme, Izmir, whichis a seaside resort on the Aegean coast of Turkey. The conference took place during August 18?20, 2010, only a few days before the 20th International Conference on Pattern Recognition (ICPR) which was held in Istanbul. The aim of the series of workshops is to create an international forum for the presentation of the latest results and exchange of ideas between researchers in the ?elds of statistical and structural pattern recognition. SPR 2010 and SSPR 2010 received a total of 99 paper submissions from many di?erent countries around the world, giving it a truly international perspective, as has been the case for previous S+SSPR workshops. This volume contains 70 accepted papers, 39 for oral and 31 for poster presentation. In addition to par- lel oral sessions for SPR and SSPR, there were two joint oral sessions of interest to both SPR and SSPR communities. Furthermore, to enhance the workshop experience, there were two joint panel sessions on ?Structural Learning? and ?Clustering,? in which short author presentations were followed by discussion. Another innovation this year was the ?lming of the proceedings by Videol- tures. 410 0$aImage Processing, Computer Vision, Pattern Recognition, and Graphics ;$v6218 606 $aArtificial intelligence 606 $aComputer programming 606 $aApplication software 606 $aInformation storage and retrieval 606 $aDatabase management 606 $aAlgorithms 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 607 $aC?es?me <2010>$2swd 615 0$aArtificial intelligence. 615 0$aComputer programming. 615 0$aApplication software. 615 0$aInformation storage and retrieval. 615 0$aDatabase management. 615 0$aAlgorithms. 615 14$aArtificial Intelligence. 615 24$aProgramming Techniques. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aInformation Storage and Retrieval. 615 24$aDatabase Management. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a006.4 702 $aHancock$b Edwin R$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWilson$b Richard C$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWindeatt$b Terry$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aUlusoy$b Ilkay$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aEscolano$b Francisco$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 02$aInternational Association for Pattern Recognition. 712 12$aInternational Workshop on Statistical Techniques in Pattern Recognition$d(8th :$f2010 :$eC?es?me, Turkey) 906 $aBOOK 912 $a996465935903316 996 $aStructural, Syntactic, and Statistical Pattern Recognition$9772717 997 $aUNISA LEADER 06281nam 22008655 450 001 996465939603316 005 20200703203257.0 010 $a1-280-38834-X 010 $a9786613566263 010 $a3-642-15152-3 024 7 $a10.1007/978-3-642-15152-1 035 $a(CKB)2670000000045041 035 $a(SSID)ssj0000446852 035 $a(PQKBManifestationID)11267879 035 $a(PQKBTitleCode)TC0000446852 035 $a(PQKBWorkID)10504737 035 $a(PQKB)11761395 035 $a(DE-He213)978-3-642-15152-1 035 $a(MiAaPQ)EBC3065718 035 $a(PPN)14902519X 035 $a(EXLCZ)992670000000045041 100 $a20100830d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrust, Privacy and Security in Digital Business$b[electronic resource] $e7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings /$fedited by Sokratis Katsikas, Miguel Soriano 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XII, 252 p. 67 illus.) 225 1 $aSecurity and Cryptology ;$v6264 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-15151-5 320 $aIncludes bibliographical references. 327 $aInvited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi?Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction. 330 $aThis book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bilbao, Spain during August 30?31, 2010. The conference continued from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007), Turin (2008) and Linz (2009). The recent advances in information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the provision of high-quality services over global networks. The aim is to utilize this ?information society era? for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organi- tions and public bodies remain competitive in the global electronic marketplace. - fortunately, such a rapid technological evolution cannot be problem-free. Concerns are raised regarding the ?lack of trust? in electronic procedures and the extent to which ?information security? and ?user privacy? can be ensured. TrustBus 2010 brought together academic researchers and industry developers, who discussed the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Bilbao to participate and debate the new emerging advances in this area. 410 0$aSecurity and Cryptology ;$v6264 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aComputer programming 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aApplication software 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 607 $aBilbao <2010>$2swd 608 $aKongress$2swd 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aComputer programming. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aApplication software. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aProgramming Techniques. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aInformation Systems Applications (incl. Internet). 676 $a381.142 686 $a380$a650$a004$2GyFmDB 702 $aKatsikas$b Sokratis$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSoriano$b Miguel$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aTrustBus 2010 906 $aBOOK 912 $a996465939603316 996 $aTrust, Privacy and Security in Digital Business$9772437 997 $aUNISA