This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
In many scientific and engineering applications, detecting and understanding differences between two groups of examples can be reduced to a classical problem of training a classif...
Volume intersection is a frequently used technique to solve the Shape-From-Silhouette problem, which constructs a 3D object estimate from a set of silhouettes taken with calibrate...
Cluster analysis is a common approach to pattern discovery in spatial databases. While many clustering techniques have been developed, it is still challenging to discover implicit...
Abstract. Expanding on our previously developed method for inserting synthetic objects into clinical computed tomography (CT) data, we model a set of eight clinical tumors that spa...