Sciweavers

50
Voted
HICSS
2011
IEEE
386views Biometrics» more  HICSS 2011»
12 years 8 months ago
Cloud Hooks: Security and Privacy Issues in Cloud Computing
In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that...
Wayne A. Jansen
FGR
2011
IEEE
384views Biometrics» more  FGR 2011»
12 years 8 months ago
The computer expression recognition toolbox (CERT)
— We present the Computer Expression Recognition Toolbox (CERT), a software tool for fully automatic real-time facial expression recognition, and officially release it for free ...
Gwen Littlewort, Jacob Whitehill, Tingfan Wu, Ian ...
FGR
2011
IEEE
354views Biometrics» more  FGR 2011»
12 years 8 months ago
Hierarchical ranking of facial attributes
Abstract— We propose a novel hierarchical structured prediction approach for ranking images of faces based on attributes. We view ranking as a bipartite graph matching problem; l...
Ankur Datta, Rogerio Feris, Daniel A. Vaquero
FGR
2011
IEEE
340views Biometrics» more  FGR 2011»
12 years 8 months ago
Action unit detection using sparse appearance descriptors in space-time video volumes
— Recently developed appearance descriptors offer the opportunity for efficient and robust facial expression recognition. In this paper we investigate the merits of the family o...
Bihan Jiang, Michel François Valstar, Maja ...
HICSS
2011
IEEE
335views Biometrics» more  HICSS 2011»
12 years 8 months ago
Cyberinfrastructure for Secondary Use of EHR Data: SSA's Use of the Nationwide Health Information Network
This study examined the use of the Nationwide Health Information Network as a cyberinfrastructure for secure and interoperable transport of existing clinical data from electronic ...
Sue S. Feldman, Thomas A. Horan
Biometrics
Top of PageReset Settings