| This book will serve as a foundation for a variety of useful applications of graph theory to computer vision, pattern recognition, and related areas. It covers a representative set of novel graph-theoretic methods for complex computer vision and pattern recognition tasks. The first part of the book presents the application of graph theory to low-level processing of digital images such as a new method for partitioning a given image into a hierarchy of homogeneous areas using graph pyramids, or a study of the relationship between graph theory and digital topology. Part II presents graph-theoretic learning algorithms for high-level computer vision and pattern recognition applications, including a survey of graph based methodologies for pattern recognition and computer vision, a presentation of a series of computationally efficient algorithms for testing graph isomorphism and related graph matching tasks in pattern recognition and a new graph distance measure to be used for solving graph matching problems. Finally, Part III provides detailed descriptions of several applications of graph-based methods to real-world pattern recognition tasks. It includes a critical review of the main graph-based and structural methods for fingerprint classification, a new method to visualize time series of graphs, and potential applications in computer network monitoring and abnormal event detection. |
|
|
Document Security: Protecting Physical and Electronic Content
Several electronic layers exist in most documents, a fact overlooked
by many writers. Probing these sublayers often reveals information
not intended for release by the author. Documents in electronic formats
create a “palimpsest” that even semiskilled investigators can probe for
sensitive data.
Palimpsest seems... | | Kali Linux CTF Blueprints
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
About This Book
-
Put the skills of the experts to the test with these tough and customisable pentesting projects
-
Develop each challenge to suit your specific...
| | Key Concepts in Energy
Organized around eight fundamental ideas, Key concepts in energy history explores the discoveries, technologies and new paradigms in the field of energy, and how they have changed the course of history. Complex technical concepts such as the “rebound effect”, “technological hybridization”, “marginal cost... |
Microsoft Access 2010 VBA Macro Programming
Database macro programming has changed enormously over the last 15 years,
having gone from Access Basic macros to VBA. Another major change occurred
with Office 95, when macros went to VBA modules in a separate environment
accessed via the Visual Basic Editor. It used to be fairly basic: code was entered into a special
design window.... | | Historical Information Science: An Emerging UnidisciplineIt suggests that trends in information retrieval, research, and teaching using modern information technology point toward a unidisciplinary field, Historical Information Science, which potentially can grow out of older quantification and Social Science history, the interplay between History and Information Science, and new methodologies and... | | Rock, Paper, Scissors: Game Theory in Everyday Life“Physicist and Ig Nobel Prize–winner Fisher explores how game theory illuminates social behavior in this lively study…. Fisher does succeed in making the complex nature of game theory accessible and relevant, showing how mathematics applies to the dilemmas we face on a daily basis.”
A FRIEND CALLED ME RECENTLY... |
|