Sciweavers

PRL
2010
82views more  PRL 2010»
13 years 6 months ago
Variational shape matching for shape classification and retrieval
Kamal Nasreddine, Abdessalam Benzinou, Ronan Fable...
PRL
2010
82views more  PRL 2010»
13 years 6 months ago
Cluster validation using information stability measures
Damaris Pascual, Filiberto Pla, José Salvad...
PRESENCE
2010
74views more  PRESENCE 2010»
13 years 6 months ago
Immersive Journalism: Immersive Virtual Reality for the First-Person Experience of News
This paper introduces the concept and discusses the implications of immersive journalism, which is the production of news in a form in which people can gain firstperson experience...
Nonny de la Peña, Peggy Weil, Joan Llobera,...
PRESENCE
2010
60views more  PRESENCE 2010»
13 years 6 months ago
Gender Differences in the Impact of Presentational Factors in Human Character Animation on Decisions in Ethical Dilemmas
Simulated humans in computer interfaces are increasingly taking on roles that were once reserved for real humans. The presentation of simulated humans is affected by their appeara...
Karl F. MacDorman, Joseph A. Coram, Chin-Chang Ho,...
PRESENCE
2010
76views more  PRESENCE 2010»
13 years 6 months ago
Modularity for Large Virtual Reality Applications
This paper focuses on the design of high performance VR applications. These applications usually involve various I/O devices and complex simulations. A parallel architecture or gri...
Jérémie Allard, Jean-Denis Lesage, B...
PRESENCE
2010
181views more  PRESENCE 2010»
13 years 6 months ago
The Effect of Viewing a Self-Avatar on Distance Judgments in an HMD-Based Virtual Environment
Few HMD-based virtual environment systems display a rendering of the user's own body. Subjectively, this often leads to a sense of disembodiment in the virtual world. We expl...
Betty J. Mohler, Sarah H. Creem-Regehr, William B....
PR
2010
135views more  PR 2010»
13 years 6 months ago
Revisiting priority queues for image analysis
Many algorithms in image analysis require a priority queue, a data structure that holds pointers to pixels in the image, and which allows efficiently finding the pixel in the queu...
Cris L. Luengo Hendriks
PR
2010
141views more  PR 2010»
13 years 6 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...