Augmented Privacy with Virtual Humans
暂无分享,去创建一个
James F. Hoburg | Yang Cai | Iryna Pavlyshak | Ryan Magargle | Joseph Laws | Iryna Pavlyshak | J. Hoburg | Yang Cai | J. Laws | R. Magargle
[1] Jean-Philippe Martin-Flatin,et al. Self-Managed Networks, Systems, and Services , 2006, Lecture Notes in Computer Science.
[2] Jean Ponce,et al. Describing surfaces , 1985, Comput. Vis. Graph. Image Process..
[3] Yang Cai,et al. A Privacy Algorithm for 3D Human Body Scans , 2006, International Conference on Computational Science.
[4] David A. Forsyth,et al. Identifying nude pictures , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.
[5] R. Nevatia,et al. 3-D Surface Description Using Curvature Properties , 1987, Photonics West - Lasers and Applications in Science and Engineering.
[6] Thomas E. Hall,et al. Millimeter-wave high-resolution holographic surveillance system , 1994, Other Conferences.
[7] C. Calladine. Gaussian curvature and shell structures , 1984 .
[8] Peter R. M. Jones,et al. Three-dimensional surface anthropometry: Applications to the human body , 1997 .
[9] Yang Cai,et al. Feature Hiding in 3D Human Body Scans* , 2006, Inf. Vis..
[10] M. Soumekh. Fourier Array Imaging , 1994 .
[11] Gaile G. Gordon,et al. Face recognition based on depth and curvature features , 1992, Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[12] Andrew W. Moore,et al. Rapid detection of significant spatial clusters , 2004, KDD.
[13] David A. Forsyth,et al. Automatic Detection of Human Nudes , 1999, International Journal of Computer Vision.
[14] Choonsik Park,et al. Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers , 2005, ICISC.
[15] Roberto Cipolla,et al. Computer Vision — ECCV '96 , 1996, Lecture Notes in Computer Science.
[16] Fabio A. González,et al. An immuno-fuzzy approach to anomaly detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[17] Milan Sonka,et al. Image Processing, Analysis and Machine Vision , 1993, Springer US.
[18] David M. Sheen,et al. Privacy algorithm for cylindrical holographic weapons surveillance system , 2000 .
[19] Xinhua Zhuang,et al. Image Analysis Using Mathematical Morphology , 1987, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[20] Thomas E. Hall,et al. Wideband millimeter-wave holographic weapons surveillance systems , 1995, Other Conferences.
[21] J. Goodman. Introduction to Fourier optics , 1969 .
[22] Xiang Liu,et al. 3D characterization and localization of anatomical landmarks of the foot , 2004, VRCAI '04.
[23] Stephen Gilmore,et al. Combining Measurement and Stochastic Modelling to Enhance Scheduling Decisions for a Parallel Mean Value Analysis Algorithm , 2006, International Conference on Computational Science.
[24] D. Souvaine,et al. An intuitive approach to measuring protein surface curvature , 2005, Proteins.
[25] Juhnyoung Lee,et al. Data Engineering Issues in E-Commerce and Services, Second International Workshop, DEECS 2006, San Francisco, CA, USA, June 26, 2006, Proceedings , 2006, DEECS.
[26] Hein A.M. Daanen,et al. Automatic feature detection in 3D human body scans , 2004 .
[27] M. Shyu,et al. A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .
[28] Andrew W. Moore,et al. Anomalous Spatial Cluster Detection , 2005 .
[29] Thomas S. Huang,et al. MAXIMAL MATCHING OF TWO THREE-DIMENSIONAL POINT SETS. , 1986 .
[30] Mehrdad Soumekh. Bistatic synthetic aperture radar inversion with application in dynamic object imaging , 1991, IEEE Trans. Signal Process..
[31] J. A. Gregory. The Mathematics of Surfaces. , 1987 .
[32] Yang Cai,et al. Visual transformation for interactive spatiotemporal data mining , 2007, Knowledge and Information Systems.
[33] David A. Forsyth,et al. Body plans , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[34] Simin Nadjm-Tehrani,et al. ADWICE - Anomaly Detection with Real-Time Incremental Clustering , 2004, ICISC.
[35] Thomas E. Hall,et al. Weapon detection using a wideband millimeter-wave linear array imaging technique , 1994, Other Conferences.
[36] Mohammad Zulkernine,et al. Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.
[37] David A. Forsyth,et al. Probabilistic Methods for Finding People , 2001, International Journal of Computer Vision.
[38] Dmitry B. Goldgof,et al. Feature extraction and terrain matching , 1988, Proceedings CVPR '88: The Computer Society Conference on Computer Vision and Pattern Recognition.
[39] Stan Salvador,et al. FastDTW: Toward Accurate Dynamic Time Warping in Linear Time and Space , 2004 .
[40] Dmitry B. Goldgof,et al. A Curvature-Based Approach to Terrain Recognition , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[41] H. D. Collins,et al. Concealed explosive detection on personnel using a wideband holographic millimeter-wave imaging system , 1996, Defense, Security, and Sensing.
[42] David M. Sheen,et al. Circular scanned millimeter-wave imaging system for weapon detection , 1995, Other Conferences.
[43] James J. Thomas,et al. Visualizing the non-visual: spatial analysis and interaction with information from text documents , 1995, Proceedings of Visualization 1995 Conference.
[44] Ramesh C. Jain,et al. Three-dimensional object recognition , 1985, CSUR.
[45] Peter Ratner. 3-d human modelling and animation , 1997 .
[46] David A. Forsyth,et al. Finding Naked People , 1996, ECCV.
[47] AZRIEL ROSENFELD,et al. Digital Straight Line Segments , 1974, IEEE Transactions on Computers.