Sciweavers

853 search results - page 128 / 171
» Flexible authentication of images
Sort
View
JNW
2008
83views more  JNW 2008»
13 years 8 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
CVPR
2009
IEEE
1356views Computer Vision» more  CVPR 2009»
15 years 4 months ago
Average of Synthetic Exact Filters
This paper introduces a class of correlation filters called Average of Synthetic Exact Filters (ASEF). For ASEF, the correlation output is completely specified for each training ...
Bruce A. Draper, David S. Bolme, J. Ross Beveridge
CVPR
2007
IEEE
14 years 10 months ago
Efficient Belief Propagation for Vision Using Linear Constraint Nodes
Belief propagation over pairwise connected Markov Random Fields has become a widely used approach, and has been successfully applied to several important computer vision problems....
Brian Potetz
ICCV
2007
IEEE
14 years 10 months ago
Variational Segmentation using Fuzzy Region Competition and Local Non-Parametric Probability Density Functions
We describe a novel variational segmentation algorithm designed to split an image in two regions based on their intensity distributions. A functional is proposed to integrate the ...
Benoit Mory, Roberto Ardon, Jean-Philippe Thiran
ECCV
2006
Springer
14 years 10 months ago
A Physically-Motivated Deformable Model Based on Fluid Dynamics
A novel deformable model for image segmentation and shape recovery is presented. The model is inspired by fluid dynamics and is based on a flooding simulation similar to the waters...
Andrei Jalba, Jos B. T. M. Roerdink