mk:iwcf10

Summary

Gestalt Aspects of Security Pattern. Mario Köppen. In Computational Forensics: 4th International Workshop, IWCF 2010, Tokyo, Japan, November 2010, Revised Selected Papers, pages 1-12.Springer Berlin / Heidelberg, , 2011. (URL)

Abstract

In this contribution, we discuss specific aspects of patterns appearing in a humanized context (as for example in computational security or forensics) and that are not well reflected in a pure feature-classification framework. Gestalt laws are considered as a more appropriate way to approach these aspects, but then, we would merely focus on an empiricial description of matter, where models are needed that might even guide to engineering procedures. For the provision of such procedures, pure image processing based approaches, despite half a century of research, seemingly did not much progress. A recently emerging new family of neural network architectures, based on the model of neural group processing, on the contrary, shows even in its mostly still premature state (from engineering point of view) already a much stronger relevance to the modeling of Gestalt aspects.

Bibtex entry

@INCOLLECTION { mk:iwcf10,
    ABSTRACT = { In this contribution, we discuss specific aspects of patterns appearing in a humanized context (as for example in computational security or forensics) and that are not well reflected in a pure feature-classification framework. Gestalt laws are considered as a more appropriate way to approach these aspects, but then, we would merely focus on an empiricial description of matter, where models are needed that might even guide to engineering procedures. For the provision of such procedures, pure image processing based approaches, despite half a century of research, seemingly did not much progress. A recently emerging new family of neural network architectures, based on the model of neural group processing, on the contrary, shows even in its mostly still premature state (from engineering point of view) already a much stronger relevance to the modeling of Gestalt aspects. },
    AFFILIATION = { Kyushu Institute of Technology, 680-4 Kawazu, Iizuka, Fukuoka 820-8502, Japan },
    AUTHOR = { Mario Köppen },
    BOOKTITLE = { Computational Forensics: 4th International Workshop, IWCF 2010, Tokyo, Japan, November 2010, Revised Selected Papers },
    ADDED = { 2011-03-31 15:49:49 +0900 },
    MODIFIED = { 2011-03-31 15:51:55 +0900 },
    EDITOR = { Sako, Hiroshi and Franke, Katrin and Saitoh, Shuji },
    PAGES = { 1-12 },
    PUBLISHER = { Springer Berlin / Heidelberg },
    SERIES = { Lecture Notes in Computer Science },
    TITLE = { Gestalt Aspects of Security Pattern },
    URL = { http://dx.doi.org/10.1007/978-3-642-19376-7_1 },
    VOLUME = { 6540 },
    YEAR = { 2011 },
    1 = { http://dx.doi.org/10.1007/978-3-642-19376-7_1 },
}

On small computer displays, you can hide this right bar by using the 'Hide' button above.

News

Next conferences COMPSAC 2014 (Vasteras, Sweden, July 2014), INCoS-2014 (Salerno, Italy, September 2014).

New edited book "Soft Computing in Industrial Applications", V. Snasel, P. Kroemer, M. Koeppen, G. Schaefer, Springer AISC 223, July 2013.