This paper presents the results of a study in which artists made line drawings intended to convey specific 3D shapes. The study was designed so that drawings could be registered w...
Forrester Cole, Aleksey Golovinskiy, Alex Limpaech...
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...
In sports broadcasts, networks consisting of pan-tiltzoom (PTZ) cameras usually exhibit very wide baselines, making standard matching techniques for camera calibration very hard t...
Jens Puwein, Remo Ziegler, Luca Ballan, Marc Polle...
In this paper we propose an approach to count the number of pedestrians, given a trajectory data set provided by a tracking system. The tracking process itself is treated as a bla...
David Biliotti, Gianluca Antonini, Jean-Philippe T...
We present a new gestural text entry method for trackballs. The method uses the mouse cursor and relies on crossing instead of pointing. A user writes in fluid Roman-like unistrok...