Sciweavers

2146 search results - page 284 / 430
» Gesture Recognition Using Image Comparison Methods
Sort
View
DSSCV
2005
Springer
15 years 8 months ago
Exploiting Deep Structure
Abstract. Blurring an image with a Gaussian of width σ and considering σ as an extra dimension, extends the image to an Gaussian scale space (GSS) image. In this GSS-image the is...
Arjan Kuijper
COMPSAC
2009
IEEE
15 years 20 days ago
Towards Usable Solutions to Graphical Password Hotspot Problem
Click based graphical passwords that use background images suffer from hot-spot problem. Previous graphical password schemes based on recognition of images do not have a sufficient...
Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, ...
ISPASS
2010
IEEE
15 years 23 days ago
Weak execution ordering - exploiting iterative methods on many-core GPUs
Abstract--On NVIDIA's many-core GPUs, there is no synchronization function among parallel thread blocks. When finegranularity of data communication and synchronization is requ...
Jianmin Chen, Zhuo Huang, Feiqi Su, Jih-Kwon Peir,...
ICIP
2010
IEEE
15 years 24 days ago
Detecting multiple copies in tampered images
Copy-move forgeries are parts of the image that are duplicated elsewhere into the same image, often after being modified by geometrical transformations. In this paper we present a...
Edoardo Ardizzone, Alessandro Bruno, Giuseppe Mazz...
AMFG
2003
IEEE
152views Biometrics» more  AMFG 2003»
15 years 8 months ago
Fully Automatic Upper Facial Action Recognition
This paper provides a new fully automatic framework to analyze facial action units, the fundamental building blocks of facial expression enumerated in Paul Ekman’s Facial Action...
Ashish Kapoor, Yuan (Alan) Qi, Rosalind W. Picard