Many objects have smooth surfaces of a fairly uniform color, thereby exhibiting shading patterns that reveal information about its shape, an important clue to the nature of the ob...
Peter Nillius, Josephine Sullivan, Antonis A. Argy...
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
This paper reports our experiments for TRECVID 2008 tasks: high level feature extraction, search and contentbased copy detection. For the high level feature extraction task, we use...
Duy-Dinh Le, Xiaomeng Wu, Shin'ichi Satoh, Sheetal...
By analyzing the similarities between bit streams coming from a network of motion detectors, we can recover the network geometry and discover structure in the human behavior being...
Christopher Richard Wren, David C. Minnen, Sriniva...
In this paper we present a novel method for tracking contour of a moving rigid object in natural video sequences from a mobile camera. While a mobile camera is keeping track of a m...
Behzad Jamasbi, Seyed Ahmad Motamedi, Alireza Behr...