By Topic

Signal-Image Technologies and Internet-Based System, 2007. SITIS '07. Third International IEEE Conference on

Date 16-18 Dec. 2007

Filter Results

Displaying Results 1 - 25 of 153
  • [Front cover]

    Publication Year: 2007, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (285 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2007, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2007, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (194 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (334 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2007, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (154 KB) | HTML iconHTML
    Freely Available from IEEE
  • Objectives

    Publication Year: 2007, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (155 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynotes and Tutorials

    Publication Year: 2007, Page(s): xvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (157 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Committees

    Publication Year: 2007, Page(s):xviii - xxvi
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • Editorial messages

    Publication Year: 2007, Page(s):xxvii - xxx
    Request permission for commercial reuse | PDF file iconPDF (172 KB) | HTML iconHTML
    Freely Available from IEEE
  • Improve Image Annotation by Combining Multiple Models

    Publication Year: 2007, Page(s):3 - 9
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    Automatic image annotation is a promising methodology for image retrieval. However most current annotation models are not yet sophisticated enough to produce high quality annotations. Given an image, some irrelevant keywords to image contents are produced, which are a primary obstacle to getting high-quality image retrieval. In this paper an approach is proposed to improve automatic image annotati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Semantic Framework for Spatiotemporal Data Representation

    Publication Year: 2007, Page(s):10 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (651 KB) | HTML iconHTML

    Spatiotemporal databases have received much attention since more and more applications, such as environment management and land management, have shown urgent requirements on the management of spatiotemporal information. But different applications have different requirements on describing spatiotemporal objects and spatiotemporal changes, and there is no systematic foundation for the modeling of sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Methodology for Low-Cost Image Annotation Based on Conceptual Modeling: A Biological Example

    Publication Year: 2007, Page(s):18 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB) | HTML iconHTML

    In the context of data-intensive biology applications the overall annotation costs are rather high since experts generally need to be involved. In some cases it is possible to automate the annotation process. In this paper we propose an approach that consists in building an image database application that enables domain technicians to make annotations without compromizing their semantical precisio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content-Based Shape Search of 3D CAD Models with Relevance Feedback

    Publication Year: 2007, Page(s):26 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (617 KB) | HTML iconHTML

    Engineers and designers often need to search out similar CAD models to make reference to and reuse the previous designs. For most of CAD models, both geometrical information and topological information are important for similarity assessment. We proposed two shape signatures to describe the geometry and the topology of a CAD model respectively. A relevance feedback mechanism is introduced to combi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extraction of Ambiguous Sequential Patterns with Least Minimum Generalization from Mismatch Clusters

    Publication Year: 2007, Page(s):35 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (539 KB) | HTML iconHTML

    An ambiguous query in sequence databases returns a set of similar subsequences, called a mismatch cluster, to the user. The inherent problem is that it is difficult for users to identify the characteristics of very large similar subsequences in a mismatch cluster. In order to support user comprehension of mismatch clusters, it is important to extract a set of ambiguous sequence patterns with the l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Frequent Closed Itemsets Mining

    Publication Year: 2007, Page(s):43 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (473 KB) | HTML iconHTML

    As many large organizations have multiple data sources and the scale of dataset becomes larger and larger, it is inevitable to carry out data mining in the distributed environment. In this paper, we address the problem of mining global frequent closed itemsets in distributed environment. A novel algorithm is proposed to obtain global frequent closed itemsets with exact frequency and it is shown th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective Site Customization Based on Web Semantics and Usage Mining

    Publication Year: 2007, Page(s):51 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (773 KB) | HTML iconHTML

    The explosive growth of online data and the diversity of goals that may be pursued over the Web have significantly increased the monetary value of the Web traffic. To tap into this accelerating market, Web site operators try to increase their traffic by customizing their sites to the needs of specific users. Web site customization involves two great challenges: the effective identification of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Privacy Preserving Data Mining Model under Distributed Environment

    Publication Year: 2007, Page(s):60 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    Privacy preserving becomes an important issue in the development progress of data mining techniques, especially in distributed data mining. Secure multiparty computation methods are proposed to protect the privacy in distributed environment, but shows low performance under massive nodes. This paper presents an adaptive privacy preserving data mining model based on data perturbation method to impro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Passage Retrieval Using Graph Vertices Comparison

    Publication Year: 2007, Page(s):71 - 76
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    In this paper, we describe an Information retrieval Model based on graph comparison. It is inspired from previous work such as KleinbergpsilaHits and Blondel et al.psilas model. Unlike previous methods, our model considers different types of nodes: text nodes (elements to retrieve and query) and term nodes, so that the resulting graph is a bipartite graph. The results on passage retrieval task sho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linguistic Analysis of Users' Queries: Towards an Adaptive Information Retrieval System

    Publication Year: 2007, Page(s):77 - 84
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    Most of information retrieval systems transform natural language users' queries into bags of words that are matched to documents, also represented as bags of words. Through such process, the richness of the query is lost. In this paper we show that linguistic features of a query are good indicators to predict systems failure to answer it. The experiments described here are based on 42 systems or s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topic Detection via Participation Using Markov Logic Network

    Publication Year: 2007, Page(s):85 - 91
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1109 KB) | HTML iconHTML

    The advent of Web 2.0 enables the proliferation of online communities in which tremendous number of Internet users contribute and share enormous information. Proper exploitation of community structure help retrieving useful information and better understanding of their features. We employ Markov Logic Network to explore topic tracking by finding clusters, which represents latent topics, best fitti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analysis of Constructed Categories for Textual Classification Using Fuzzy Similarity and Agglomerative Hierarchical Methods

    Publication Year: 2007, Page(s):92 - 99
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    Ambiguity is a challenge faced by systems that handle natural language. To assuage the issue of linguistic ambiguities found in text classification, this work proposes a text categorizer using the methodology of Fuzzy Similarity. The grouping algorithms Stars and Cliques are adopted in the Agglomerative Hierarchical method and they identify the groups of texts by specifying some time of relationsh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Application of Wavelet & DCSK Watermarking in Multimedia Security

    Publication Year: 2007, Page(s):103 - 108
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (707 KB) | HTML iconHTML

    Nowadays digital Multimedia copyright protection is up against austere challenge. The watermarking and encryption used together is more and more important in digital multimedia security (DMS) application. So in this paper, a novel approximation zero-tree-wise wavelet watermarking with difference chaos shift key coding encryption method of DMS information security is present. Firstly the DMS inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UMQL: A Unified Multimedia Query Language

    Publication Year: 2007, Page(s):109 - 115
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (437 KB) | HTML iconHTML

    We propose a unified multimedia query language called UMQL, based on a semi-structured data model. In contrast to previous multimedia query languages that are either designed only for one particular medium or not powerful enough on multimedia query ability, UMQL is a general and powerful multimedia language which can support effectively queries based on content, structure, spatial relationships an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization Algorithm and Data Security Problem in Distributed Information Systems

    Publication Year: 2007, Page(s):116 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    In this work we present a new rule-discovery method for distributed information system. DIS is the system that connects a number of information systems using network communication technology. This communication can be driven by request for knowledge needed to predict for maximal optimization which missing values can be replaced. In this work we recall the notion of a distributed information system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.