The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
In this paper, we analyze the formation of blocking artifacts as a result of quantization of the discrete cosine transform (DCT) coefficients. These artifacts are known to be the ...
We present a novel and intuitive framework for building modular vision systems for complex tasks such as surveillance applications. Inspired by graphical models, especially factor...
We discuss the use of adaptive biorthogonal wavelet packet bases in a probabilistic approach to texture analysis, thus combining the advantages of biorthogonal wavelets (FIR, line...
G. Charith K. Abhayaratne, Ian Jermyn, Josiane Zer...
Impression evidence in the form of shoe-prints are commonly found in crime scenes. A critical step in automatic shoe-print identification is extraction of the shoe-print pattern. ...