Sciweavers

667 search results - page 29 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
SIBGRAPI
2006
IEEE
15 years 5 months ago
Expression Transfer between Photographs through Multilinear AAM's
Expression Transfer is a method for mapping a photographed expression performed by a given subject onto the photograph of another person’s face. Building on well succeeded previ...
Ives Macedo, Emilio Vital Brazil, Luiz Velho
PTS
2010
167views Hardware» more  PTS 2010»
14 years 9 months ago
Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases
The addition of a cross-cutting concern in a program, through aspect weaving, has an impact on its existing behaviors. If test cases exist for the program, it is necessary to ident...
Romain Delamare, Freddy Munoz, Benoit Baudry, Yves...
CHI
2006
ACM
16 years 5 days ago
The validity of the stimulated retrospective think-aloud method as measured by eye tracking
Retrospective Think aloud (RTA) is a usability method that collects the verbalization of a user's performance after the performance is over. There has been little work done t...
Zhiwei Guan, Shirley Lee, Elisabeth Cuddihy, Judit...
ICDAR
2011
IEEE
13 years 11 months ago
Text-Line Extraction Using a Convolution of Isotropic Gaussian Filter with a Set of Line Filters
—Text-line extraction is a key task in document analysis. Methods based on anisotropic Gaussian filtering and ridge detection have shown good results. This paper describes perfo...
Syed Saqib Bukhari, Faisal Shafait, Thomas M. Breu...
CORR
2010
Springer
286views Education» more  CORR 2010»
14 years 8 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos