A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Analyzing fluid motion is essential in number of domains and can rarely be handled using generic computer vision techniques. In this particular application context, we address two ...
This paper presents a geometric approach to recognizing smooth objects from their outlines. We define a signature function that associates feature vectors with objects and baseline...
Svetlana Lazebnik, Amit Sethi, Cordelia Schmid, Da...
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. We present...
Shared text input is a technique we implemented into a note taking system for facilitating text entry on small devices. Instead of writing out words on the tedious text entry inte...