Sciweavers

15325 search results - page 2888 / 3065
» People in Computer Vision
Sort
View
267
Voted
TIP
1998
456views more  TIP 1998»
14 years 1 months ago
Snakes, Shapes, and Gradient Vector Flow
Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. Problems associated with initiali...
Chenyang Xu, Jerry L. Prince
MMSYS
2012
242views more  MMSYS 2012»
14 years 15 days ago
6DMG: a new 6D motion gesture database
Motion-based control is gaining popularity, and motion gestures form a complementary modality in human-computer interactions. To achieve more robust user-independent motion gestur...
Mingyu Chen, Ghassan Al-Regib, Biing-Hwang Juang
CCS
2009
ACM
16 years 5 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
SIGUCCS
1998
ACM
15 years 9 months ago
The ResNet Obstacle Course
There are many ways to train student employees, but hands-on experience is invaluable. To provide our Resident Computer Consultants (RCCs) with the experience they need to solve t...
Kathleen A. Hausmann
DRUMS
1998
Springer
15 years 9 months ago
Handling uncertainty in control of autonomous robots
Autonomous robots need the ability to move purposefully and without human intervention in real-world environments that have not been speci cally engineered for them. These environm...
Alessandro Saffiotti
« Prev « First page 2888 / 3065 Last » Next »