Sciweavers

118 search results - page 16 / 24
» Computational approaches for real-time extraction of soft bi...
Sort
View
ICPR
2008
IEEE
15 years 4 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
FGR
1996
IEEE
198views Biometrics» more  FGR 1996»
15 years 1 months ago
Towards 3D hand tracking using a deformable model
In this paper we rst describe how we have constructed a 3D deformable Point Distribution Model of the human hand, capturing training data semi-automatically from volume images via...
Tony Heap, David Hogg
CVPR
2006
IEEE
15 years 11 months ago
On-line Boosting and Vision
Boosting has become very popular in computer vision, showing impressive performance in detection and recognition tasks. Mainly off-line training methods have been used, which impl...
Helmut Grabner, Horst Bischof
ICPR
2006
IEEE
15 years 11 months ago
Part-Based Probabilistic Point Matching
Correspondence algorithms typically struggle with shapes that display part-based variation. We present a probabilistic approach that matches shapes using independent part transfor...
Graham McNeill, Sethu Vijayakumar
CVPR
2010
IEEE
15 years 6 months ago
Simultaneous Foreground, Background, and Alpha Estimation for Image Matting
Image matting is the process of extracting a soft segmentation of an object in an image as defined by the matting equation. Most current techniques focus largely on computing the ...
Bryan Price, Bryan Morse, Scott Cohen