Sciweavers

796 search results - page 80 / 160
» Spoofing prevention method
Sort
View
TITS
2010
286views Education» more  TITS 2010»
13 years 4 months ago
Understanding Transit Scenes: A Survey on Human Behavior-Recognition Algorithms
Visual surveillance is an active research topic in image processing. Transit systems are actively seeking new or improved ways to use technology to deter and respond to accidents, ...
Joshua Candamo, Matthew Shreve, Dmitry B. Goldgof,...
RR
2010
Springer
13 years 8 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
TMI
2008
149views more  TMI 2008»
13 years 10 months ago
Shape-Driven Three-Dimensional Watersnake Segmentation of Biological Membranes in Electron Tomography
Abstract--Due to the significant complexity of membrane morphology and the generally poor image quality in electron tomographic volumes, current automatic methods for segmentation ...
Hieu Tat Nguyen, Qiang Ji
CVPR
2007
IEEE
15 years 1 days ago
Discriminative Learning of Dynamical Systems for Motion Tracking
We introduce novel discriminative learning algorithms for dynamical systems. Models such as Conditional Random Fields or Maximum Entropy Markov Models outperform the generative Hi...
Minyoung Kim, Vladimir Pavlovic
ICCV
2007
IEEE
14 years 12 months ago
Classification of Weakly-Labeled Data with Partial Equivalence Relations
In many vision problems, instead of having fully labeled training data, it is easier to obtain the input in small groups, where the data in each group is constrained to be from th...
Sanjiv Kumar, Henry A. Rowley