首页 > 最新文献

BCS International Academic Conference最新文献

英文 中文
Fast Estimation of Nonparametric Kernel Density Through PDDP, and its Application in Texture Synthesis 基于PDDP的非参数核密度快速估计及其在纹理合成中的应用
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.19
A. Sinha, Sumana Gupta
In thiswork, a newalgorithmis proposed for fast estimation of nonparametricmultivariate kernel density, based on principal direction divisive partitioning (PDDP) of the data space. The goal of the proposed algorithm is to use the finite support property of kernels for fast estimation of density. Compared to earlier approaches, this work explains the need of using boundaries (for partitioning the space) instead of centroids (used in earlier approaches), for better unsupervised nature (less user incorporation), and lesser (or atleast same) computational complexity. In earlier approaches, the finite support of a fixed kernel varies within the space due to the use of cluster centroids. It has been argued that if one uses boundaries (for partitioning) rather than centroids, the finite support of a fixed kernel does not change for a constant precision error. This fact introduces better unsupervision within the estimation framework. Themain contributionof thiswork is the insight gained in the kernel density estimation with the incorporation of clustering algortihm and its application in texture synthesis. Texture synthesis through nonparametric, noncausal, Markov random field (MRF), has been implemented earlier through estimation of and sampling from nonparametric conditional density. The incorporation of the proposed kernel density estimation algorithm within the earlier texture synthesis algorithm reduces the computational complexity with perceptually same results. These results provide the efficacy of the proposed algorithm within the context of natural texture synthesis.
本文提出了一种基于数据空间主方向分裂划分(PDDP)的非参数多元核密度快速估计算法。该算法的目标是利用核的有限支持特性来快速估计密度。与早期的方法相比,这项工作解释了使用边界(用于划分空间)而不是质心(在早期的方法中使用)的需求,以获得更好的无监督性质(更少的用户合并),以及更低(或至少相同)的计算复杂性。在早期的方法中,由于使用聚类质心,固定核的有限支持在空间内变化。有人认为,如果使用边界(用于划分)而不是质心,则固定核的有限支持不会因恒定的精度误差而改变。这一事实在评估框架中引入了更好的非监督。本文的主要贡献是在核密度估计中引入了聚类算法及其在纹理合成中的应用。通过非参数、非因果、马尔可夫随机场(MRF)的纹理合成,已经通过非参数条件密度的估计和采样实现。将所提出的核密度估计算法整合到先前的纹理合成算法中,降低了计算复杂度,并获得了感知上相同的结果。这些结果证明了该算法在自然纹理合成环境下的有效性。
{"title":"Fast Estimation of Nonparametric Kernel Density Through PDDP, and its Application in Texture Synthesis","authors":"A. Sinha, Sumana Gupta","doi":"10.14236/EWIC/VOCS2008.19","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.19","url":null,"abstract":"In thiswork, a newalgorithmis proposed for fast estimation of nonparametricmultivariate kernel density, based on principal direction divisive partitioning (PDDP) of the data space. The goal of the proposed algorithm is to use the finite support property of kernels for fast estimation of density. Compared to earlier approaches, this work explains the need of using boundaries (for partitioning the space) instead of centroids (used in earlier approaches), for better unsupervised nature (less user incorporation), and lesser (or atleast same) computational complexity. In earlier approaches, the finite support of a fixed kernel varies within the space due to the use of cluster centroids. It has been argued that if one uses boundaries (for partitioning) rather than centroids, the finite support of a fixed kernel does not change for a constant precision error. This fact introduces better unsupervision within the estimation framework. Themain contributionof thiswork is the insight gained in the kernel density estimation with the incorporation of clustering algortihm and its application in texture synthesis. \u0000 \u0000Texture synthesis through nonparametric, noncausal, Markov random field (MRF), has been implemented earlier through estimation of and sampling from nonparametric conditional density. The incorporation of the proposed kernel density estimation algorithm within the earlier texture synthesis algorithm reduces the computational complexity with perceptually same results. These results provide the efficacy of the proposed algorithm within the context of natural texture synthesis.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124161762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Use of Real-Time Maude for Architecture Description and Verification: A Case Study 实时模型在建筑描述与验证中的应用:一个案例研究
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.26
Chadlia Jerad, Kamel Barkaoui, A. Touzi
Real-Time Maude is an executable rewriting logic language particularly well suited for the specification of object-oriented open and distributed real time systems. In this paper we explore the possibility of using Real-Time Maude as a formal notation for software architecture description and verification of real time systems. The system model is composed of two kinds of descriptions: static and dynamic. The static description consists in identifying the different elements composing the architecture, while the dynamic description is the definition of the rules governing the system behaviour in terms of the possible actions allowed. The correspondence between software architecture concepts and the Real-Time Maude concepts are developed for this purpose. The step towards verifying system architecture is realized by applying Real-Time Maude simulation and analysis techniques to the described model and the properties that must be satisfied. An example is used to illustrate our proposal and to compare it with other architecture description languages.
real - time Maude是一种可执行的重写逻辑语言,特别适合于面向对象的开放和分布式实时系统规范。在本文中,我们探讨了使用real - time Maude作为实时系统的软件体系结构描述和验证的正式符号的可能性。系统模型由静态和动态两种描述组成。静态描述包括识别组成体系结构的不同元素,而动态描述是根据允许的可能操作来定义控制系统行为的规则。软件架构概念和Real-Time Maude概念之间的对应关系是为此目的而开发的。验证系统架构的步骤是通过对所描述的模型和必须满足的特性应用实时仿真和分析技术来实现的。用一个例子来说明我们的建议,并将其与其他架构描述语言进行比较。
{"title":"On the Use of Real-Time Maude for Architecture Description and Verification: A Case Study","authors":"Chadlia Jerad, Kamel Barkaoui, A. Touzi","doi":"10.14236/EWIC/VOCS2008.26","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.26","url":null,"abstract":"Real-Time Maude is an executable rewriting logic language particularly well suited for the specification of object-oriented open and distributed real time systems. In this paper we explore the possibility of using Real-Time Maude as a formal notation for software architecture description and verification of real time systems. The system model is composed of two kinds of descriptions: static and dynamic. The static description consists in identifying the different elements composing the architecture, while the dynamic description is the definition of the rules governing the system behaviour in terms of the possible actions allowed. The correspondence between software architecture concepts and the Real-Time Maude concepts are developed for this purpose. The step towards verifying system architecture is realized by applying Real-Time Maude simulation and analysis techniques to the described model and the properties that must be satisfied. An example is used to illustrate our proposal and to compare it with other architecture description languages.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Incremental Connectivity-Based Outlier Factor Algorithm 基于增量连通性的离群因子算法
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.18
D. Pokrajac, N. Reljin, N. Pejcic, A. Lazarevic
Outlier detection has recently become an important problem in many industrial and financial applications. Often, outliers have to be detected from data streams that continuously arrive from data sources. Incremental outlier detection algorithms, aimed at detecting outliers as soon as they appear in a database, have recently become emerging research field. In this paper, we develop an incremental version of connectivity-based outlier factor (COF) algorithm and discuss its computational complexity. The proposed incremental COF algorithm has equivalent detection performance as the iterated static COF algorithm (applied after insertion of each data record), with significant reduction in computational time. The paper provides theoretical and experimental evidence that the number of updates per such insertion/deletion does not depend on the total number of points in the data set, which makes algorithm viable for very large dynamic datasets. Finally, we also illustrate an application of the proposed algorithm on motion detection in video surveillance applications.
近年来,异常值检测已成为许多工业和金融应用中的重要问题。通常,必须从不断从数据源到达的数据流中检测异常值。增量异常点检测算法是近年来新兴的研究领域,其目的是在数据库中出现异常点时立即进行检测。本文提出了一种增量版本的基于连通性的离群因子(COF)算法,并讨论了其计算复杂度。本文提出的增量COF算法具有与迭代静态COF算法(在插入每条数据记录后应用)相当的检测性能,并且显著减少了计算时间。本文提供了理论和实验证据,证明每次插入/删除的更新次数不依赖于数据集中点的总数,这使得算法适用于非常大的动态数据集。最后,我们还举例说明了该算法在视频监控中的运动检测应用。
{"title":"Incremental Connectivity-Based Outlier Factor Algorithm","authors":"D. Pokrajac, N. Reljin, N. Pejcic, A. Lazarevic","doi":"10.14236/EWIC/VOCS2008.18","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.18","url":null,"abstract":"Outlier detection has recently become an important problem in many industrial and financial applications. Often, outliers have to be detected from data streams that continuously arrive from data sources. Incremental outlier detection algorithms, aimed at detecting outliers as soon as they appear in a database, have recently become emerging research field. In this paper, we develop an incremental version of connectivity-based outlier factor (COF) algorithm and discuss its computational complexity. The proposed incremental COF algorithm has equivalent detection performance as the iterated static COF algorithm (applied after insertion of each data record), with significant reduction in computational time. The paper provides theoretical and experimental evidence that the number of updates per such insertion/deletion does not depend on the total number of points in the data set, which makes algorithm viable for very large dynamic datasets. Finally, we also illustrate an application of the proposed algorithm on motion detection in video surveillance applications.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116191872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Hardware Relaxation Paradigm for Solving NP-Hard Problems 求解np困难问题的硬件松弛范式
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.8
W. Cockshott, Andreas Koltes, J. O'Donnell, P. Prosser, W. Vanderbauwhede
Digital circuits with feedback loops can solve some instances of NP-hard problems by relaxation: the circuit will either oscillate or settle down to a stable state that represents a solution to the problem instance. This approach differs from using hardware accelerators to speed up the execution of deterministic algorithms, as it exploits stabilisation properties of circuits with feedback, and it allows a variety of hardware techniques that do not have counterparts in software. A feedback circuit that solves many instances of Boolean satisfiability problems is described, with experimental results from a preliminary simulation using a hardware accelerator.
带有反馈回路的数字电路可以通过松弛来解决np困难问题的一些实例:电路要么振荡,要么稳定到一个稳定的状态,代表问题实例的解决方案。这种方法不同于使用硬件加速器来加速确定性算法的执行,因为它利用了带有反馈的电路的稳定特性,并且它允许各种硬件技术,而这些技术在软件中没有对应的。描述了一种解决布尔可满足性问题的反馈电路,并给出了使用硬件加速器进行初步仿真的实验结果。
{"title":"A Hardware Relaxation Paradigm for Solving NP-Hard Problems","authors":"W. Cockshott, Andreas Koltes, J. O'Donnell, P. Prosser, W. Vanderbauwhede","doi":"10.14236/EWIC/VOCS2008.8","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.8","url":null,"abstract":"Digital circuits with feedback loops can solve some instances of NP-hard problems by relaxation: the circuit will either oscillate or settle down to a stable state that represents a solution to the problem instance. This approach differs from using hardware accelerators to speed up the execution of deterministic algorithms, as it exploits stabilisation properties of circuits with feedback, and it allows a variety of hardware techniques that do not have counterparts in software. A feedback circuit that solves many instances of Boolean satisfiability problems is described, with experimental results from a preliminary simulation using a hardware accelerator.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130788918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Beatbox - A Computer Simulation Environment for Computational Biology of the Heart Beatbox -心脏计算生物学的计算机模拟环境
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.10
Ross McFarlane, I. Biktasheva
Despite over a century's study, the trigger mechanisms of cardiac arrhythmias are poorly understood. Even modern experimental methods do not provide sufficient temporal and spacial resolution to trace the development of fibrillation in samples of cardiac tissue, not to mention the heart in vivo. Advances in human genetics provide information on the impact of certain genes on cellular activity, but do not explain the resultant mechanisms by which fibrillation arises. Thus, for some genetic cardiac diseases, the first presenting symptom is death. Computer simulations of electrical activity in cardiac tissue offer increasingly detailed insight into these phenomena, providing a view of cellular-level activity on the scale of a whole tissue wall. Already, advances in this field have led to developments in our understanding of heart fibrillation and sudden cardiac death and their impact is expected to increase significantly as we approach the ultimate goal of whole-heart modelling. Modelling the propagation of Action Potential through cardiac tissue is computationally expensive due to the huge number of equations per cell and the vast spacial and temporal scales required. The complexity of the problem encompasses the description of ionic currents underlying excitation of a single cell through the inhomogeneity of the tissue to the complex geometry of the whole heart. The timely running of computational models of cardiac tissue is increasingly dependant on the effective use of High Performance Computing (HPC), i.e. systems with parallel processors. Current state of the art cardiac simulation tools are limited either by the availability of modern, detailed models, or by their hardware portability or ease of use. The miscellany of current model implementations leads many researchers to develop their own ad-hoc software, preventing them from both utilising the power of HPC effectively, and from collaborating fluidly. It is, arguably, impeding scientific progress. This paper presents a roadmap for the development of Beatbox, a computer simulation environment for computational biology of the heart--an adaptable and extensible framework with which High Performance Computing may be harnessed by researchers.
尽管经过了一个多世纪的研究,但人们对心律失常的触发机制知之甚少。即使是现代实验方法也不能提供足够的时间和空间分辨率来追踪心脏组织样本中纤颤的发展,更不用说体内的心脏了。人类遗传学的进步提供了某些基因对细胞活动影响的信息,但不能解释纤维性颤动产生的最终机制。因此,对于一些遗传性心脏病,首先出现的症状是死亡。心脏组织电活动的计算机模拟为这些现象提供了越来越详细的见解,提供了整个组织壁尺度上细胞水平活动的视图。这一领域的进展已经使我们对心脏颤动和心源性猝死的理解有所发展,随着我们接近全心建模的最终目标,它们的影响预计会显著增加。模拟动作电位在心脏组织中的传播在计算上是昂贵的,因为每个细胞都需要大量的方程和巨大的空间和时间尺度。这个问题的复杂性包括描述单个细胞通过组织的不均匀性激发到整个心脏的复杂几何结构的离子电流。心脏组织计算模型的及时运行越来越依赖于高性能计算(HPC)的有效使用,即具有并行处理器的系统。目前最先进的心脏模拟工具受到现代,详细模型的可用性或其硬件可移植性或易用性的限制。当前模型实现的杂乱导致许多研究人员开发他们自己的ad-hoc软件,这既阻碍了他们有效地利用HPC的能力,也阻碍了他们流畅地协作。可以说,它阻碍了科学进步。本文提出了Beatbox的发展路线图,Beatbox是一个用于心脏计算生物学的计算机模拟环境——一个可适应和可扩展的框架,研究人员可以利用高性能计算。
{"title":"Beatbox - A Computer Simulation Environment for Computational Biology of the Heart","authors":"Ross McFarlane, I. Biktasheva","doi":"10.14236/EWIC/VOCS2008.10","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.10","url":null,"abstract":"Despite over a century's study, the trigger mechanisms of cardiac arrhythmias are poorly understood. Even modern experimental methods do not provide sufficient temporal and spacial resolution to trace the development of fibrillation in samples of cardiac tissue, not to mention the heart in vivo. Advances in human genetics provide information on the impact of certain genes on cellular activity, but do not explain the resultant mechanisms by which fibrillation arises. Thus, for some genetic cardiac diseases, the first presenting symptom is death. \u0000 \u0000Computer simulations of electrical activity in cardiac tissue offer increasingly detailed insight into these phenomena, providing a view of cellular-level activity on the scale of a whole tissue wall. Already, advances in this field have led to developments in our understanding of heart fibrillation and sudden cardiac death and their impact is expected to increase significantly as we approach the ultimate goal of whole-heart modelling. \u0000 \u0000Modelling the propagation of Action Potential through cardiac tissue is computationally expensive due to the huge number of equations per cell and the vast spacial and temporal scales required. The complexity of the problem encompasses the description of ionic currents underlying excitation of a single cell through the inhomogeneity of the tissue to the complex geometry of the whole heart. The timely running of computational models of cardiac tissue is increasingly dependant on the effective use of High Performance Computing (HPC), i.e. systems with parallel processors. Current state of the art cardiac simulation tools are limited either by the availability of modern, detailed models, or by their hardware portability or ease of use. The miscellany of current model implementations leads many researchers to develop their own ad-hoc software, preventing them from both utilising the power of HPC effectively, and from collaborating fluidly. It is, arguably, impeding scientific progress. \u0000 \u0000This paper presents a roadmap for the development of Beatbox, a computer simulation environment for computational biology of the heart--an adaptable and extensible framework with which High Performance Computing may be harnessed by researchers.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"594 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122938050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Web Engineering Revisited 重新审视网络工程
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.4
Erik Wilde, M. Gaedke
Web Engineering has become one of the core disciplines for building Web-oriented applications. This paper proposes to reposition Web engineering to be more specific to what the Web is, by which we mean not only an interface technology, but an information system, into which Web-oriented applications have to be embedded. More traditional Web applications often are just user interfaces to data silos, whereas the last years have shown that well-designed Web-oriented applications can essentially start with no data, and derive all their value from being open and attracting users on a large scale. We propose "Web Engineering 2.0" to not focus anymore on how to engineer for the Web, but how to engineer the Web. Such an approach to Web engineering not only leads to a more disciplined way of engineering the Web, it also allows computer science to better integrate the special properties of the Web, most importantly the loosely coupled nature of the Web, and the importance of the social systems driving the Web.
Web工程已经成为构建面向Web的应用程序的核心学科之一。本文建议对Web工程进行重新定位,使其更具体地说明Web是什么,这里我们指的不仅仅是一种接口技术,而是一种信息系统,面向Web的应用程序必须嵌入其中。更传统的Web应用程序通常只是数据筒仓的用户界面,而过去几年的经验表明,设计良好的面向Web的应用程序基本上可以从没有数据开始,并从开放和吸引大规模用户中获得所有价值。我们建议“Web工程2.0”不再关注如何为Web设计,而是如何设计Web。这种Web工程方法不仅导致了一种更有纪律的Web工程方法,而且还允许计算机科学更好地集成Web的特殊属性,最重要的是Web的松散耦合特性,以及驱动Web的社会系统的重要性。
{"title":"Web Engineering Revisited","authors":"Erik Wilde, M. Gaedke","doi":"10.14236/EWIC/VOCS2008.4","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.4","url":null,"abstract":"Web Engineering has become one of the core disciplines for building Web-oriented applications. This paper proposes to reposition Web engineering to be more specific to what the Web is, by which we mean not only an interface technology, but an information system, into which Web-oriented applications have to be embedded. More traditional Web applications often are just user interfaces to data silos, whereas the last years have shown that well-designed Web-oriented applications can essentially start with no data, and derive all their value from being open and attracting users on a large scale. We propose \"Web Engineering 2.0\" to not focus anymore on how to engineer for the Web, but how to engineer the Web. Such an approach to Web engineering not only leads to a more disciplined way of engineering the Web, it also allows computer science to better integrate the special properties of the Web, most importantly the loosely coupled nature of the Web, and the importance of the social systems driving the Web.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131773591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Spontaneous Pain Expression Recognition in Video Sequences 视频序列中的自发疼痛表情识别
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.17
Z. Hammal, M. Kunz, M. Arguin, F. Gosselin
Automatic recognition of Pain expression has potential medical significance. In this paper we present results of the application of an automatic facial expression recognition system on sequences of spontaneous Pain expression. Twenty participants were videotaped while undergoing thermal heat stimulation at nonpainful and painful intensities. Pain was induced experimentally by use of a Peltierbased, computerized thermal stimulator with a 3 × 3 cm2 contact probe. Our aim is to automatically recognize the videos where Pain was induced. We chose a machine learning approach, previously used successfully to categorize the six basic facial expressions in posed datasets [1, 2] based on the Transferable Belief Model. For this paper, we extended this model to the recognition of sequences of spontaneous Pain expression. The originality of the proposed method is the use of the dynamic information for the recognition of spontaneous Pain expression and the combination of different sensors: facial features behavior, transient features and the context of the expression study. Experimental results show good classification rates for spontaneous Pain sequences especially when we use the contextual information. Moreover the system behaviour compares favourably to the human observer in the other case, which opens promising perspectives for the future development of the proposed system.
疼痛表情的自动识别具有潜在的医学意义。本文介绍了一种自动面部表情识别系统在自然疼痛表情序列上的应用结果。20名参与者在接受非疼痛和疼痛强度的热刺激时被录像。实验中使用基于peltier1的计算机热刺激器和一个3 × 3 cm2的接触探针来诱导疼痛。我们的目标是自动识别引起疼痛的视频。我们选择了一种机器学习方法,该方法之前曾成功地用于基于可转移信念模型(Transferable Belief Model)对摆出的数据集中的六种基本面部表情进行分类[1,2]。在本文中,我们将该模型扩展到自发疼痛表达序列的识别。该方法的创新之处在于利用动态信息识别自发的疼痛表情,并结合不同的传感器:面部特征行为、瞬态特征和表情研究的背景。实验结果表明,当我们使用上下文信息时,自发疼痛序列的分类率很高。此外,在另一种情况下,系统行为比人类观察者更有利,这为所提出系统的未来发展开辟了有希望的前景。
{"title":"Spontaneous Pain Expression Recognition in Video Sequences","authors":"Z. Hammal, M. Kunz, M. Arguin, F. Gosselin","doi":"10.14236/EWIC/VOCS2008.17","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.17","url":null,"abstract":"Automatic recognition of Pain expression has potential medical significance. In this paper we present results of the application of an automatic facial expression recognition system on sequences of spontaneous Pain expression. Twenty participants were videotaped while undergoing thermal heat stimulation at nonpainful and painful intensities. Pain was induced experimentally by use of a Peltierbased, computerized thermal stimulator with a 3 × 3 cm2 contact probe. Our aim is to automatically recognize the videos where Pain was induced. We chose a machine learning approach, previously used successfully to categorize the six basic facial expressions in posed datasets [1, 2] based on the Transferable Belief Model. For this paper, we extended this model to the recognition of sequences of spontaneous Pain expression. The originality of the proposed method is the use of the dynamic information for the recognition of spontaneous Pain expression and the combination of different sensors: facial features behavior, transient features and the context of the expression study. Experimental results show good classification rates for spontaneous Pain sequences especially when we use the contextual information. Moreover the system behaviour compares favourably to the human observer in the other case, which opens promising perspectives for the future development of the proposed system.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117307352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Provenance-Based Auditing of Private Data Use 基于来源的私有数据使用审计
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.13
Rocío Aldeco-Pérez, L. Moreau
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and exposition of private data to unauthorized recipients have been publicly and widely advertised. For authorities and system administrators to check compliance to regulations, auditing of private data processing becomes crucial in IT systems. Finding the origin of some data, determining how some data is being used, checking that the processing of some data is compatible with the purpose for which the data was captured are typical functionality that an auditing capability should support, but difficult to implement in a reusable manner. Such questions are so-called provenance questions, where provenance is defined as the process that led to some data being produced. The aim of this paper is to articulate how data provenance can be used as the underpinning approach of an auditing capability in IT systems. We present a case study based on requirements of the Data Protection Act and an application that audits the processing of private data, which we apply to an example manipulating private data in a university.
在世界各地,组织都需要遵守规定如何管理个人信息的监管框架。尽管如此,一些数据泄露和向未经授权的接收者公开私人数据的案例已经被公开和广泛宣传。为了让当局和系统管理员检查法规的遵从性,审计私有数据处理在IT系统中变得至关重要。查找某些数据的来源、确定某些数据的使用方式、检查某些数据的处理是否与捕获数据的目的兼容,这些都是审计功能应该支持的典型功能,但很难以可重用的方式实现。这类问题就是所谓的来源问题,来源被定义为导致某些数据产生的过程。本文的目的是阐明如何将数据来源用作IT系统中审计功能的基础方法。我们提出了一个基于数据保护法要求的案例研究和一个审计私有数据处理的应用程序,并将其应用于一个在大学中操纵私有数据的示例。
{"title":"Provenance-Based Auditing of Private Data Use","authors":"Rocío Aldeco-Pérez, L. Moreau","doi":"10.14236/EWIC/VOCS2008.13","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.13","url":null,"abstract":"Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and exposition of private data to unauthorized recipients have been publicly and widely advertised. For authorities and system administrators to check compliance to regulations, auditing of private data processing becomes crucial in IT systems. Finding the origin of some data, determining how some data is being used, checking that the processing of some data is compatible with the purpose for which the data was captured are typical functionality that an auditing capability should support, but difficult to implement in a reusable manner. Such questions are so-called provenance questions, where provenance is defined as the process that led to some data being produced. The aim of this paper is to articulate how data provenance can be used as the underpinning approach of an auditing capability in IT systems. We present a case study based on requirements of the Data Protection Act and an application that audits the processing of private data, which we apply to an example manipulating private data in a university.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122811991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Contexts for Human Action 人类行为的语境
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.5
G. White
We argue that the mathematics developed for the semantics of computer languages can be fruitfully applied to problems in human communication and action.
我们认为,为计算机语言语义开发的数学可以有效地应用于人类交流和行动中的问题。
{"title":"Contexts for Human Action","authors":"G. White","doi":"10.14236/EWIC/VOCS2008.5","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.5","url":null,"abstract":"We argue that the mathematics developed for the semantics of computer languages can be fruitfully applied to problems in human communication and action.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122927721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Tier, Location-Aware and Highly Resilient Key Predistribution Scheme for Wireless Sensor Networks 无线传感器网络的两层、位置感知和高弹性密钥预分配方案
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.30
A. Ünlü, A. Levi
We propose a probabilistic key predistribution scheme for wireless sensor networks, where keying materials are distributed to sensor nodes for secure communication. We use a two-tier approach in which there are two types of nodes: regular nodes and agent nodes. Agent nodes are more capable than regular nodes. Our node deployment model is zone-based such that the nodes that may end up with closer positions on ground are grouped together. The keying material of nodes that belong to different zones is non-overlapping. However, it is still possible for nodes that belong to different zones to communicate with each other via agent nodes when needed. We give a comparative analysis of our scheme through simulations and show that our scheme provides good connectivity figures at reasonable communication cost. Most importantly, simulation results show that our scheme is highly resilient to node captures.
我们提出了一种无线传感器网络的概率密钥预分发方案,其中密钥材料被分发到传感器节点以确保通信安全。我们使用两层方法,其中有两种类型的节点:常规节点和代理节点。代理节点比普通节点更有能力。我们的节点部署模型是基于区域的,因此可能最终位于地面上较近位置的节点被分组在一起。属于不同区域的节点的关键材料不重叠。但是,属于不同区域的节点在需要时仍然可以通过代理节点相互通信。通过仿真对该方案进行了比较分析,结果表明该方案在合理的通信成本下提供了良好的连通性。最重要的是,仿真结果表明我们的方案对节点捕获具有很高的弹性。
{"title":"Two-Tier, Location-Aware and Highly Resilient Key Predistribution Scheme for Wireless Sensor Networks","authors":"A. Ünlü, A. Levi","doi":"10.14236/EWIC/VOCS2008.30","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.30","url":null,"abstract":"We propose a probabilistic key predistribution scheme for wireless sensor networks, where keying materials are distributed to sensor nodes for secure communication. We use a two-tier approach in which there are two types of nodes: regular nodes and agent nodes. Agent nodes are more capable than regular nodes. Our node deployment model is zone-based such that the nodes that may end up with closer positions on ground are grouped together. The keying material of nodes that belong to different zones is non-overlapping. However, it is still possible for nodes that belong to different zones to communicate with each other via agent nodes when needed. We give a comparative analysis of our scheme through simulations and show that our scheme provides good connectivity figures at reasonable communication cost. Most importantly, simulation results show that our scheme is highly resilient to node captures.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"87 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
BCS International Academic Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1