- This paper proposes a new method to detect, alert and protect the user from Internationalized Domain Names [1] (IDN) and Uniform Resource Locator (URL) spoofing, phishing, pharmi...
We propose a sequential information maximization model as a general strategy for programming eye movements. The model reconstructs high-resolution visual information from a sequen...
Laura Walker Renninger, James M. Coughlan, Preeti ...
We describe an algorithm for automatically learning discriminative components of objects with SVM classifiers. It is based on growing image parts by minimizing theoretical bounds ...
Bernd Heisele, Thomas Serre, Massimiliano Pontil, ...
: We describe a technique for visually tracking flashlights so that they can be used as fun, cheap, intuitive and safe interaction devices with a wide range of surfaces. Our implem...
Ahmed Ghali, Steve Benford, Sahar Bayoumi, Jonatha...
Contour integration in low-level vision is believed to occur based on lateral interaction between neurons with similar orientation tuning. The exact neural mechanisms underlying s...