Sciweavers

339 search results - page 30 / 68
» Detection of facial characteristics based on edge informatio...
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 3 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ICIP
1999
IEEE
14 years 10 months ago
Roc Curves for Performance Evaluation of Video Sequences Processing Systems for Surveillance Applications
Performances evaluation of image processing intermediate results in video based surveillance systems is extremely important due to the variety of approaches to this task. In this ...
Franco Oberti, Andrea Teschioni, Carlo S. Regazzon...
ICMCS
2006
IEEE
149views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Semantic 3D Face Mesh Simplification for Transmission and Visualization
Three-dimensional data generated from range scanners is usually composed of a huge amount of information. Simplification and compression techniques must be adopted in order to red...
Alessandro Colombo, Claudio Cusano, Raimondo Schet...
IV
2009
IEEE
191views Visualization» more  IV 2009»
14 years 3 months ago
An Heuristic for the Construction of Intersection Graphs
Most methods for generating Euler diagrams describe the detection of the general structure of the final draw as the first and most important step. This information is often depi...
Paolo Simonetto, David Auber
ICCV
2009
IEEE
14 years 11 months ago
Image Saliency by Isocentric Curvedness and Color
In this paper we propose a novel computational method to infer visual saliency in images. The method is based on the idea that salient objects should have local characteristics tha...
Roberto Valenti