Photo image authentication is an interesting and demanding field in the computer vision and image processing community. This research is motivated by its wide range of application...
: Functionally related genes involved in the same molecular-genetic, biochemical, or physiological process are often regulated coordinately Such regulation is provided by precisely...
Alexander E. Kel, Tatiana Konovalova, Tagir Valeev...
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
While many methods exist for visualising scalar and vector data, visualisation of tensor data is still troublesome. We present a method for visualising second order tensors in thr...
Andreas Sigfridsson, Tino Ebbers, Einar Heiberg, L...
In this paper we describe a method to support interaction with a cellphone based projectorcamera system. We describe a novel approach that uses a technique known in Computer Visio...
Christopher Richard Wren, Yuri A. Ivanov, Paul A. ...