Sciweavers

2503 search results - page 447 / 501
» Building Computer Network Attacks
Sort
View
ICCV
2007
IEEE
15 years 4 months ago
 A Component Based Deformable Model for Generalized Face Alignment
This paper presents a component based deformable model for generalized face alignment, in which a novel bistage statistical framework is proposed to account for both local and g...
Yuchi Huang, Qingshan Liu, Dimitris Metaxas
CVPR
2007
IEEE
14 years 11 months ago
Leveraging temporal, contextual and ordering constraints for recognizing complex activities in video
We present a scalable approach to recognizing and describing complex activities in video sequences. We are interested in long-term, sequential activities that may have several par...
Benjamin Laxton, Jongwoo Lim, David J. Kriegman
ICCV
2007
IEEE
14 years 11 months ago
Finding a Closed Boundary by Growing Minimal Paths from a Single Point on 2D or 3D Images
In this paper, we present a new method for segmenting closed contours and surfaces. Our work builds on a variant of the Fast Marching algorithm. First, an initial point on the des...
Fethallah Benmansour, Stephane Bonneau, Laurent D....
CHI
2009
ACM
14 years 9 months ago
Predicting tie strength with social media
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic...
Eric Gilbert, Karrie Karahalios
CHI
2006
ACM
14 years 9 months ago
Quantifying interpersonal influence in face-to-face conversations based on visual attention patterns
A novel measure for automatically quantifying the amount of interpersonal influence present in face-toface conversations is proposed based on the visualattention patterns of the p...
Kazuhiro Otsuka, Junji Yamato, Yoshinao Takemae, H...