Sciweavers

2503 search results - page 447 / 501
» Building Computer Network Attacks
Sort
View
ICCV
2007
IEEE
16 years 8 months ago
 A Component Based Deformable Model for Generalized Face Alignment
This paper presents a component based deformable model for generalized face alignment, in which a novel bistage statistical framework is proposed to account for both local and g...
Yuchi Huang, Qingshan Liu, Dimitris Metaxas
CVPR
2007
IEEE
16 years 3 months ago
Leveraging temporal, contextual and ordering constraints for recognizing complex activities in video
We present a scalable approach to recognizing and describing complex activities in video sequences. We are interested in long-term, sequential activities that may have several par...
Benjamin Laxton, Jongwoo Lim, David J. Kriegman
ICCV
2007
IEEE
16 years 3 months ago
Finding a Closed Boundary by Growing Minimal Paths from a Single Point on 2D or 3D Images
In this paper, we present a new method for segmenting closed contours and surfaces. Our work builds on a variant of the Fast Marching algorithm. First, an initial point on the des...
Fethallah Benmansour, Stephane Bonneau, Laurent D....
CHI
2009
ACM
16 years 2 months ago
Predicting tie strength with social media
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic...
Eric Gilbert, Karrie Karahalios
CHI
2006
ACM
16 years 1 months ago
Quantifying interpersonal influence in face-to-face conversations based on visual attention patterns
A novel measure for automatically quantifying the amount of interpersonal influence present in face-toface conversations is proposed based on the visualattention patterns of the p...
Kazuhiro Otsuka, Junji Yamato, Yoshinao Takemae, H...