Abstract. We address the validation of the current sensed environmental state against a model known from earlier perception. Our surface based approach compares 3D range data of a ...
Abstract. Interaction increases flexibility of segmentation but it leads to undesirable behaviour of an algorithm if knowledge being requested is inappropriate. In region growing, ...
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
See a PPT file with videos at www.research.microsoft.com/users/jojic/FlexiblesSprites.htm We propose a technique for automatically learning layers of "flexible sprites" ...
In this paper, we introduce tamper detection techniques based on artifacts created by Color Filter Array (CFA) processing in most digital cameras. The techniques are based on comp...