Sciweavers

2399 search results - page 68 / 480
» On Authentication between Human and Computer
Sort
View
78
Voted
IVC
2000
173views more  IVC 2000»
14 years 9 months ago
A computational approach to color adaptation effects
The human vision system has adaptation mechanisms that cannot be managed with the classic tri-stimulus color theory. The effects of these mechanisms are clearly visible in some we...
Daniele Marini, Alessandro Rizzi
SIGGRAPH
1997
ACM
15 years 2 months ago
Anatomy-based modeling of the human musculature
Artists study anatomy to understand the relationship between exterior form and the structures responsible for creating it. In this paper we follow a similar approach in developing...
Ferdi Scheepers, Richard E. Parent, Wayne E. Carls...
CSE
2009
IEEE
15 years 2 months ago
Investigating Bimodal Clustering in Human Mobility
—We apply a simple clustering algorithm to a large dataset of cellular telecommunication records, reducing the complexity of mobile phone users’ full trajectories and allowing ...
James P. Bagrow, Tal Koren
ICMCS
1999
IEEE
202views Multimedia» more  ICMCS 1999»
15 years 2 months ago
A Human-Assisted System to Build 3-D Models from a Single Image
We present a system at the junction between Computer Vision and Computer Graphics, to produce a 3-D model of an object as observed in a single image, with a minimum of high-level ...
Alexandre R. J. François, Gérard G. ...
WS
2004
ACM
15 years 3 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel