Sciweavers

5675 search results - page 26 / 1135
» Exploiting Chaos for Computation
Sort
View
CCS
2010
ACM
15 years 4 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
125
Voted
ICCV
2007
IEEE
16 years 5 months ago
Exploiting Occluding Contours for Real-Time 3D Tracking: A Unified Approach
Gang Li, Yanghai Tsin, Yakup Genc
121
Voted
ICCV
2001
IEEE
16 years 5 months ago
Uncalibrated Motion Capture Exploiting Articulated Structure Constraints
David Liebowitz, Stefan Carlsson
ICCV
2001
IEEE
16 years 5 months ago
Smarter Presentations: Exploiting Homography in Camera-Projector Systems
Rahul Sukthankar, Robert G. Stockton, Matthew D. M...
ICCV
1999
IEEE
16 years 5 months ago
Exploiting Human Actions and Object Context for Recognition Tasks
Darnell J. Moore, Irfan A. Essa, Monson H. Hayes