Sciweavers

4013 search results - page 292 / 803
» computer 2002
Sort
View
129
Voted
DSN
2002
IEEE
15 years 9 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
ECCV
2002
Springer
16 years 6 months ago
Dense Motion Analysis in Fluid Imagery
Analyzing fluid motion is essential in number of domains and can rarely be handled using generic computer vision techniques. In this particular application context, we address two ...
Thomas Corpetti, Étienne Mémin, Patr...
ECCV
2002
Springer
16 years 6 months ago
On Pencils of Tangent Planes and the Recognition of Smooth 3D Shapes from Silhouettes
This paper presents a geometric approach to recognizing smooth objects from their outlines. We define a signature function that associates feature vectors with objects and baseline...
Svetlana Lazebnik, Amit Sethi, Cordelia Schmid, Da...
ICPR
2002
IEEE
16 years 6 months ago
Hiding a Face in a Fingerprint Image
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. We present...
Anil K. Jain, Umut Uludag, Rein-Lien Hsu
CHI
2002
ACM
16 years 5 months ago
Shared text input for note taking on handheld devices
Shared text input is a technique we implemented into a note taking system for facilitating text entry on small devices. Instead of writing out words on the tedious text entry inte...
Laurent Denoue, Patrick Chiu, Tohru Fuse