Computer vision

Results: 5749



#Item
501Image processing / Computer vision / Computer graphics / Color space / Image search / Color histogram / RGB color model / Content-based image retrieval / Pixel / Edge detection

August 8, :30 WSPC/115-IJPRAIInternational Journal of Pattern Recognition and Artificial Intelligence Vol. 16, No–619

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2013-07-12 03:09:44
502Machine learning / Deep learning / Convolutional neural network / Pattern recognition / Artificial neural network / Computer vision / Boosting / Supervised learning / Dimensionality reduction / ImageNet / Statistical classification / Cross-validation

Using Pre-Trained Models for Fine-Grained Image Classification in Fashion Field Anna Iliukovich-Strakovskaia Alexey Dral

Add to Reading List

Source URL: kddfashion2016.mybluemix.net

Language: English - Date: 2016-08-14 10:56:50
503Computer vision / Estimation theory / Statistical theory / Robust statistics / Regression analysis / Image registration / Point set registration / Shape context / Outlier / Maximum likelihood estimation / Conference on Computer Vision and Pattern Recognition / Linear regression

Robust Estimation of Nonrigid Transformation for Point Set Registration Jiayi Ma1,2 , Ji Zhao3 , Jinwen Tian1 , Zhuowen Tu4 , and Alan L. Yuille2 1 Huazhong University of Science and Technology, 2 Department of Statistic

Add to Reading List

Source URL: pages.ucsd.edu

Language: English - Date: 2013-04-18 12:34:39
504Dynamical system / Systems / Systems theory / Topology / Regression analysis

International Journal of Computer Vision 51(2), 91–109, 2003 c 2003 Kluwer Academic Publishers. Manufactured in The Netherlands.  Dynamic Textures GIANFRANCO DORETTO

Add to Reading List

Source URL: www.stat.ucla.edu

Language: English - Date: 2003-04-03 14:42:44
505Image segmentation / Graph cuts in computer vision / Segmentation-based object categorization

IWSSIP17th International Conference on Systems, Signals and Image Processing Colour based human skin segmentation using graph-cuts L. Lattari, A. Conci, A. Montenegro, E. Clua

Add to Reading List

Source URL: www.gcg.ufjf.br

Language: English - Date: 2016-07-25 19:25:54
506Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
507Computer vision / Image processing / Image segmentation / Background subtraction / Region growing / Image analysis / Rigid motion segmentation / Video Sequences Saliency Map

Two New Surveillance Systems Ming-Deng Huang (黃明燈), Ling-Hwei Chen (陳玲慧) E-mail: and Department of Computer and Information Science National Chiao Tung Univer

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2013-07-12 03:09:44
508Vision / Stereophotogrammetry / Artificial intelligence / 3D computer graphics / Epipolar geometry / Stereoscopy / 3D reconstruction / 3D scanner / Kinect / Fundamental matrix / Stereopsis / Binocular disparity

Microsoft Word - 24oliveira.doc

Add to Reading List

Source URL: medicalresearch.inescporto.pt

Language: English
509Computer vision / Image registration / Medical imaging / Random walk / Watershed / Minimum spanning tree

ENHANCING ACCURACY OF SYMMETRIC RANDOM WALKER IMAGE REGISTRATION VIA A NOVEL DATA-CONSISTENCY MEASURE Lisa Y. W. Tang1,2 and Roger Tam2 and Ghassan Hamarneh1 1 Medical Image Analysis Lab., School of Computing Science, S

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2016-02-06 13:56:22
510Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
UPDATE