Standard image based segmentation approaches perform poorly when there is little or no contrast along boundaries of different regions. In such cases, segmentation is largely perfor...
Kilian M. Pohl, John W. Fisher III, Ron Kikinis, W...
Most approaches to detection and classification of human activity deal with observing individual persons. However, people often tend to organize into groups to achieve certain goa...
Marko Jug, Janez Pers, Branko Dezman, Stanislav Ko...
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Since it is hard to handcraft the prior knowledge in a shape detection framework, machine learning methods are preferred to exploit the expert annotation of the target shape in a d...
Yefeng Zheng, Xiang Sean Zhou, Bogdan Georgescu, S...
We present a variational integration of nonlinear shape statistics into a Mumford?Shah based segmentation process. The nonlinear statistics are derived from a set of training silho...