Sciweavers

16513 search results - page 3012 / 3303
» Numerical Analysis Methods
Sort
View
TIFS
2008
145views more  TIFS 2008»
15 years 4 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
TIFS
2008
179views more  TIFS 2008»
15 years 4 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
TIP
2008
344views more  TIP 2008»
15 years 4 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino
145
Voted
TIP
2008
157views more  TIP 2008»
15 years 4 months ago
Robust Face Tracking via Collaboration of Generic and Specific Models
Significant appearance changes of objects under different orientations could cause loss of tracking, "drifting." In this paper, we present a collaborative tracking framew...
Peng Wang, Qiang Ji
TIP
2008
256views more  TIP 2008»
15 years 4 months ago
Image-Based Human Age Estimation by Manifold Learning and Locally Adjusted Robust Regression
Estimating human age automatically via facial image analysis has lots of potential real-world applications, such as human computer interaction and multimedia communication. However...
Guodong Guo, Yun Fu, Charles R. Dyer, Thomas S. Hu...
« Prev « First page 3012 / 3303 Last » Next »