default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2006
- 34th Applied Image Pattern Recognition Workshop (AIPR 2005), 19-21 October 2005, Washington, DC, USA, Proceedings. IEEE Computer Society 2006, ISBN 0-7695-2479-6 [contents]
- 2005
- Anjani Achanta, Mark McKenna, Joseph Heyman, Kevin Rudd, Mark K. Hinders, Peter J. Costianes:
Non-Linear Acoustic Concealed Weapons Detection. AIPR 2005: 21-27 - Robert J. Bonneau:
A Rate Distortion Method for Waveform Design in RF Image Formation. AIPR 2005: 63-69 - Stanley E. Borek:
An Overview of Through the Wall Surveillance for Homeland Security. AIPR 2005: 42-47 - Kenneth Byrd, Jianchao Zeng, Mohamed F. Chouikha:
Performance Assessment of Mammography Image Segmentation Algorithms. AIPR 2005: 152-157 - Aristide Chikando, Jason M. Kinser:
Optimizing Image Segmentation Using Color Model Mixtures. AIPR 2005: 230-235 - Charles J. Cohen:
A Control Theoretic Method for Categorizing Visual Imagery as Human Motion Behaviors. AIPR 2005: 184-191 - Peter J. Costianes:
An Overview of Concealed Weapons Detection for Homeland Security. AIPR 2005: 2-6 - Xiaofeng Fan, Harvey E. Rhody, Eli Saber:
Automatic Registration of Multi-Sensor Airborne Imagery. AIPR 2005: 81-86 - Girish Gopalakrishnan, S. V. Bharath Kumar, Ajay Narayanan, Rakesh Mullick:
A Fast Piece-wise Deformable Method for Multi-Modality Image Registration. AIPR 2005: 114-119 - Satyanadh Gundimada, Vijayan K. Asari:
An Improved SNoW Based Classification Technique for Head-pose Estimation and Face Detection. AIPR 2005: 94-99 - Satyanadh Gundimada, Vijayan K. Asari:
Adaptive Confidence Level Assignment to Segmented Human Face Regions for Improved Face Recognition. AIPR 2005: 100-105 - Neelam Gupta, Dale Smith:
A Field-Portable Simultaneous Dual-band Infrared Hyperspectral Imager. AIPR 2005: 87-93 - Murat Guven, Birsen Yazici, Xavier Intes, Britton Chance:
Hierarchical Bayesian Algorithm for Diffuse Optical Tomography. AIPR 2005: 140-145 - Murat Guven, Birsen Yazici, Kiwoon Kwon, Eldar Giladi:
Discretization Error Based Mesh Generation for Diffuse Optical Tomography. AIPR 2005: 146-151 - Orlando J. Hernandez, Mitchell S. Kleiman:
Face Recognition Using Multispectral Random Field Texture Models, Color Content, and Biometric Features. AIPR 2005: 204-209 - Rick Kendrick, Jason Mudge, David N. Christie, Eamon B. Barrett:
Hyper-Spectral Aural Cueing. AIPR 2005: 70-73 - Umar Shahbaz Khan, Javaid Iqbal, Mahmood A. Khan:
Automatic Inspection System Using Machine Vision. AIPR 2005: 210-217 - Jason M. Kinser, Guisong Wang:
Content Based Object Retrieval with Image Primitive Database. AIPR 2005: 179-183 - Teddy Ko:
Multimodal Biometric Identification for Large User Population Using Fingerprint, Face and Iris Recognition. AIPR 2005: 218-223 - Kajoli Banerjee Krishnan, Pavel Fomitchov, Stephen J. Lomnes, Manohar Kollegal, Floris P. Jansen:
Dual-Modality Imager Based on Ultrasonic Modulation of Incoherent Light in Turbid Medium. AIPR 2005: 126-132 - Balasubramanian Lakshminarayanan, Hairong Qi:
Civilian Target Detection using Hierarchical Fusion. AIPR 2005: 173-178 - Kurt J. Linden, William R. Neal, Jerry Waldman, Andrew J. Gatesman, Andriy Danylov:
Terahertz Laser Based Standoff Imaging System. AIPR 2005: 7-14 - Yunqian Ma, Zheng Wang, Mike Bazakos, Wing Au:
3D Scene Modeling using Sensor Fusion with Laser Range Finder and Image Sensor. AIPR 2005: 224-229 - Raj Madhavan, Mike Foedisch, Tommy Chang, Tsai Hong:
Grouping Sensory Primitives for Object Recognition and Tracking. AIPR 2005: 166-172 - Anthony J. Maeder, Birgit M. Planitz:
Medical Image Watermarking for Multiple Modalities. AIPR 2005: 158-165 - Mohamed Mahfouz, Aly E. Fathy, Yunqiang Yang, Emam ElHak Ali, Ahmed M. Badawi:
See-Through-Wall Imaging using Ultra Wideband Pulse Systems. AIPR 2005: 48-53 - Rulon Mayer, Jonathan Edwards, John Antoniades:
Segmentation Approach and Comparison to Hyperspectral Object Detection Algorithms. AIPR 2005: 36-41 - Dalma Novak, Rod B. Waterhouse, A. Farnham:
Millimeter-Wave Weapons Detection System. AIPR 2005: 15-20 - Scott K. Ralph, John M. Irvine, Magnús Snorrason, Mark R. Stevens, David Vanstone:
An Image Metric-Based ATR Performance Prediction Testbed. AIPR 2005: 192-197
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-04 15:42 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint