Terrance E. Boult, PH.d. - Publications

Affiliations: 
1979-1994 CS Columbia University, New York, NY 
 1994-2003 Lehigh University, Bethlehem, PA, United States 
 2003- University of Colorado, Colorado Springs, Colorado Springs, CO, United States 
Area:
Computer Science

125 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Boult TE, Cruz S, Dhamija A, Gunther M, Henrydoss J, Scheirer W. Learning and the Unknown: Surveying Steps toward Open World Recognition Proceedings of the Aaai Conference On Artificial Intelligence. 33: 9801-9807. DOI: 10.1609/aaai.v33i01.33019801  0.599
2019 Rozsa A, Günther M, Rudd EM, Boult TE. Facial attributes: Accuracy and adversarial robustness Pattern Recognition Letters. 124: 100-108. DOI: 10.1016/J.Patrec.2017.10.024  0.792
2017 Rudd EM, Jain LP, Scheirer WJ, Boult TE. The Extreme Value Machine. Ieee Transactions On Pattern Analysis and Machine Intelligence. PMID 28541894 DOI: 10.1109/Tpami.2017.2707495  0.792
2017 Rudd EM, Rozsa A, Gunther M, Boult TE. A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions Ieee Communications Surveys & Tutorials. 19: 1145-1172. DOI: 10.1109/Comst.2016.2636078  0.78
2017 Emersic Z, Stepec D, Struc V, Peer P, George A, Ahmad A, Omar E, Boult TE, Safdaii R, Zhou Y, Zafeiriou S, Yaman D, Eyiokur FI, Ekenel HK. The unconstrained ear recognition challenge International Journal of Central Banking. 715-724. DOI: 10.1109/Btas.2017.8272761  0.372
2017 Gunther M, Hu P, Herrmann C, Chan CH, Jiang M, Yang S, Dhamija AR, Ramanan D, Beyerer J, Kittler J, Jazaery MA, Nouyed MI, Guo G, Stankiewicz C, Boult TE. Unconstrained Face Detection and Open-Set Face Recognition Challenge International Journal of Central Banking. 697-706. DOI: 10.1109/Btas.2017.8272759  0.387
2017 Rozsa A, Gunther M, Boult TE. LOTS about attacking deep features International Journal of Central Banking. 168-176. DOI: 10.1109/Btas.2017.8272695  0.785
2017 Gunther M, Rozsa A, Boult TE. AFFACT: Alignment-free facial attribute classification technique International Journal of Central Banking. 90-99. DOI: 10.1109/Btas.2017.8272686  0.799
2016 Alsaadi FE, Boult TE. Furthering fingerprint-based authentication: Introducing the true-neighbor template 2016 Ieee Winter Conference On Applications of Computer Vision, Wacv 2016. DOI: 10.1109/WACV.2016.7477674  0.564
2016 Alsaadi FE, Boult TE. Perpetuating biometrics for authentication introducing the durable True-Neighbor template Advances in Intelligent Systems and Computing. 448: 161-176. DOI: 10.1007/978-3-319-32467-8_16  0.603
2015 Rozsa A, Glock AE, Boult TE. Genetic algorithm attack on minutiae-based fingerprint authentication and protected template fingerprint systems Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 2015: 100-108. DOI: 10.1109/CVPRW.2015.7301325  0.58
2015 Bendale A, Boult T. Towards Open World Recognition Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 7: 1893-1902. DOI: 10.1109/CVPR.2015.7298799  0.624
2015 Ayodele AO, Rao J, Boult TE. Performance Measurement and Interference Profiling in Multi-tenant Clouds Proceedings - 2015 Ieee 8th International Conference On Cloud Computing, Cloud 2015. 941-949. DOI: 10.1109/CLOUD.2015.128  0.513
2015 White R, Burkhart A, George R, Boult T, Chow E. Towards comparable cross-sector risk analyses: A re-examination of the Risk Analysis and Management for Critical Asset Protection (RAMCAP) methodology International Journal of Critical Infrastructure Protection. DOI: 10.1016/J.Ijcip.2016.05.001  0.626
2014 Scheirer WJ, Jain LP, Boult TE. Probability Models for Open Set Recognition. Ieee Transactions On Pattern Analysis and Machine Intelligence. 36: 2317-24. PMID 26353070 DOI: 10.1109/Tpami.2014.2321392  0.801
2014 Alzahrani H, Boult TE. Remote authentication using vaulted fingerprint verification Proceedings of Spie - the International Society For Optical Engineering. 9075. DOI: 10.1117/12.2053126  0.773
2014 Wilber MJ, Rudd E, Heflin B, Lui YM, Boult TE. Exemplar codes for facial attributes and tattoo recognition 2014 Ieee Winter Conference On Applications of Computer Vision, Wacv 2014. 205-212. DOI: 10.1109/WACV.2014.6836099  0.743
2014 Scheirer WJ, Jain LP, Boult TE. Probability models for open set recognition Ieee Transactions On Pattern Analysis and Machine Intelligence. 36: 2317-2324. DOI: 10.1109/TPAMI.2014.2321392  0.78
2014 Alsolami F, Boult T. CloudStash: Using secret-sharing scheme to secure data, not keys, in multi-clouds Itng 2014 - Proceedings of the 11th International Conference On Information Technology: New Generations. 315-320. DOI: 10.1109/ITNG.2014.119  0.554
2014 Albahdal AA, Boult TE. Problems and promises of using the cloud and biometrics Itng 2014 - Proceedings of the 11th International Conference On Information Technology: New Generations. 293-300. DOI: 10.1109/ITNG.2014.112  0.555
2014 Bendale A, Boult T. Reliable posterior probability estimation for streaming face recognition Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 56-63. DOI: 10.1109/CVPRW.2014.14  0.595
2014 Scheirer WJ, Wilber MJ, Eckmann M, Boult TE. Good recognition is non-metric Pattern Recognition. 47: 2721-2731. DOI: 10.1016/J.Patcog.2014.02.018  0.795
2014 White R, Boult T, Chow E. A computational asset vulnerability model for the strategic protection of the critical infrastructure International Journal of Critical Infrastructure Protection. 7: 167-177. DOI: 10.1016/J.Ijcip.2014.06.002  0.636
2014 Jain LP, Scheirer WJ, Boult TE. Multi-class open set recognition using probability of inclusion Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8691: 393-409. DOI: 10.1007/978-3-319-10578-9_26  0.786
2013 Scheirer WJ, de Rezende Rocha A, Sapkota A, Boult TE. Toward open set recognition. Ieee Transactions On Pattern Analysis and Machine Intelligence. 35: 1757-72. PMID 23682001 DOI: 10.1109/Tpami.2012.256  0.808
2013 Sapkota A, Boult TE. GRAB: Generalized region assigned to binary Eurasip Journal On Image and Video Processing. 2013. DOI: 10.1186/1687-5281-2013-35  0.738
2013 Sapkota A, Boult TE. GRAB: Generalized region assigned to binary Local binary patterns (LBP)-based image and video analysis Eurasip Journal On Image and Video Processing. 2013. DOI: 10.1186/1687-5281-2013-35  0.723
2013 Scheirer WJ, Kumar N, Iyer VN, Belhumeur PN, Boult TE. How reliable are your visual attributes? Proceedings of Spie - the International Society For Optical Engineering. 8712. DOI: 10.1117/12.2018974  0.765
2013 Johnson RC, Scheirer WJ, Boult TE. Secure voice based authentication for mobile devices: Vaulted voice verification Proceedings of Spie - the International Society For Optical Engineering. 8712. DOI: 10.1117/12.2015649  0.726
2013 Wilber MJ, Scheirer WJ, Leitner P, Heflin B, Zott J, Reinke D, Delaney DK, Boult TE. Animal recognition in the Mojave Desert: Vision tools for field biologists Proceedings of Ieee Workshop On Applications of Computer Vision. 206-213. DOI: 10.1109/WACV.2013.6475020  0.7
2013 Felzenszwalb PF, Forsyth DA, Fua P, Boult TE. TPAMI CVPR special section Ieee Transactions On Pattern Analysis and Machine Intelligence. 35: 2819-2820. DOI: 10.1109/Tpami.2013.208  0.563
2013 Johnson RC, Boult TE. With vaulted voice verification my voice is my key 2013 Ieee International Conference On Technologies For Homeland Security, Hst 2013. 453-459. DOI: 10.1109/THS.2013.6699047  0.537
2013 Jain L, Wilber MJ, Boult TE. Issues in rotational (non-)invariance and image preprocessing Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 76-83. DOI: 10.1109/CVPRW.2013.19  0.736
2013 Sapkota A, Boult TE. Large scale unconstrained open set face database Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712756  0.745
2013 Sapkota A, Gopalan R, Zavesky E, Boult TE. Appearance, context and co-occurrence ensembles for identity recognition in personal photo collections Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712723  0.74
2013 Johnson RC, Boult TE, Scheirer WJ. Voice authentication using short phrases: Examining accuracy, security and privacy issues Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712713  0.71
2013 Albahdal AA, Alzahrani H, Jain LP, Boult TE. Trusted BWI: Privacy and trust enhanced biometric web identities Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712712  0.705
2013 Scheirer WJ, Bishop W, Boult TE. Beyond PKI: The biocryptographic key infrastructure Security and Privacy in Biometrics. 45-68. DOI: 10.1007/978-1-4471-5230-9_3  0.697
2012 Wilber MJ, Boult TE. Secure remote matching with privacy: Scrambled support vector vaulted verification (S 2V 3) Proceedings of Ieee Workshop On Applications of Computer Vision. 169-176. DOI: 10.1109/WACV.2012.6163018  0.58
2012 Heflin B, Scheirer W, Boult TE. For your eyes only Proceedings of Ieee Workshop On Applications of Computer Vision. 193-200. DOI: 10.1109/WACV.2012.6163013  0.669
2012 Scheirer WJ, Rocha ADR, Parris J, Boult TE. Learning for meta-recognition Ieee Transactions On Information Forensics and Security. 7: 1214-1224. DOI: 10.1109/TIFS.2012.2192430  0.696
2012 Sapkota A, Boult T. Context-patch for difficult face recognition Proceedings - 2012 5th Iapr International Conference On Biometrics, Icb 2012. 59-66. DOI: 10.1109/ICB.2012.6199759  0.736
2012 Wilber MJ, Scheirer WJ, Boult TE. PRIVV: Private remote iris-authentication with Vaulted Verification Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 97-104. DOI: 10.1109/CVPRW.2012.6239222  0.702
2012 Scheirer WJ, Kumar N, Belhumeur PN, Boult TE. Multi-attribute spaces: Calibration for attribute fusion and similarity search Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 2933-2940. DOI: 10.1109/CVPR.2012.6248021  0.69
2012 Heflin B, Scheirer W, Boult TE. Detecting and classifying scars, marks, and tattoos found in the wild 2012 Ieee 5th International Conference On Biometrics: Theory, Applications and Systems, Btas 2012. 31-38. DOI: 10.1109/BTAS.2012.6374555  0.698
2011 Scheirer WJ, Rocha A, Micheals RJ, Boult TE. Meta-Recognition: The Theory and Practice of Recognition Score Analysis. Ieee Transactions On Pattern Analysis and Machine Intelligence. PMID 21422483 DOI: 10.1109/Tpami.2011.54  0.797
2011 Rocha A, Scheirer W, Boult T, Goldenstein S. Vision of the unseen: Current trends and challenges in digital image and video forensics Acm Computing Surveys. 43. DOI: 10.1145/1978802.1978805  0.738
2011 Zhang T, Boult T. Realistic stereo error models and finite optimal stereo baselines 2011 Ieee Workshop On Applications of Computer Vision, Wacv 2011. 426-433. DOI: 10.1109/WACV.2011.5711535  0.496
2011 Parris J, Wilber M, Heflin B, Rara H, El-Barkouky A, Farag A, Movellan J, Anonymous, Castrilon-Santana M, Lorenzo-Navarro J, Teli MN, Marcel S, Atanasoaei C, Boult TE. Face and eye detection on hard datasets 2011 International Joint Conference On Biometrics, Ijcb 2011. DOI: 10.1109/Ijcb.2011.6117593  0.62
2011 Scheirer WJ, Kumar N, Ricanek K, Belhumeur PN, Boult TE. Fusing with context: A Bayesian approach to combining descriptive attributes 2011 International Joint Conference On Biometrics, Ijcb 2011. DOI: 10.1109/Ijcb.2011.6117490  0.759
2011 Ayodele A, Henrydoss J, Schrier W, Boult TE. Study of malware threats faced by the typical email user Communications in Computer and Information Science. 196: 513-525. DOI: 10.1007/978-3-642-22540-6_50  0.564
2010 Bendale AZ, Boult TE. Id-privacy in large scale biometric systems 2010 Ieee International Workshop On Information Forensics and Security, Wifs 2010. DOI: 10.1109/WIFS.2010.5711439  0.512
2010 Scheirer W, Bishop B, Boult T. Beyond PKI: The biocryptographic key infrastructure 2010 Ieee International Workshop On Information Forensics and Security, Wifs 2010. DOI: 10.1109/WIFS.2010.5711435  0.697
2010 Boult T, Dandapani R, Polok N, Reddy VK, Stock GN. The bachelor of innovation™ family of degrees: Transforming education in engineering to education in innovation 2010 Ieee Transforming Engineering Education: Creating Interdisciplinary Skills For Complex Global Environments. DOI: 10.1109/TEE.2010.5508826  0.508
2010 Heflin B, Parks B, Scheirer W, Boult T. Single image deblurring for a real-time face recognition system Iecon Proceedings (Industrial Electronics Conference). 1185-1192. DOI: 10.1109/IECON.2010.5675537  0.731
2010 Sapkota A, Parks B, Scheirer W, Boult T. FACE-GRAB: Face recognition with General Region Assigned to Binary operator 2010 Ieee Computer Society Conference On Computer Vision and Pattern Recognition - Workshops, Cvprw 2010. 82-89. DOI: 10.1109/CVPRW.2010.5544597  0.785
2010 Iyer VN, Kirkbride SR, Parks BC, Scheirer WJ, Boult TE. A taxonomy of face-models for system evaluation 2010 Ieee Computer Society Conference On Computer Vision and Pattern Recognition - Workshops, Cvprw 2010. 63-70. DOI: 10.1109/CVPRW.2010.5543603  0.712
2010 Heflin B, Scheirer W, Boult TE. Correcting rolling-shutter distortion of CMOS sensors using facial feature detection Ieee 4th International Conference On Biometrics: Theory, Applications and Systems, Btas 2010. DOI: 10.1109/BTAS.2010.5634528  0.702
2010 Iyer VN, Scheirer WJ, Boult TE. Face system evaluation toolkit: Recognition is harder than it seems Ieee 4th International Conference On Biometrics: Theory, Applications and Systems, Btas 2010. DOI: 10.1109/BTAS.2010.5634517  0.726
2010 Parks B, Boult T. Top-down facilitation of multistage decisions for face recognition Ieee 4th International Conference On Biometrics: Theory, Applications and Systems, Btas 2010. DOI: 10.1109/BTAS.2010.5634485  0.551
2010 Scheirer W, Rocha A, Micheals R, Boult T. Robust fusion: Extreme value theory for recognition score normalization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6313: 481-495. DOI: 10.1007/978-3-642-15558-1_35  0.764
2009 Scheirer WJ, Rocha A, Heflin B, Boult TE. Difficult detection: A comparison of two different approaches to eye detection for unconstrained environments Ieee 3rd International Conference On Biometrics: Theory, Applications and Systems, Btas 2009. DOI: 10.1109/BTAS.2009.5339040  0.693
2009 Scheirer WJ, Boult TE. Bipartite biotokens: Definition, implementation and analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5558: 775-785. DOI: 10.1007/978-3-642-01793-3_79  0.681
2008 Boult TE, Scheirer WJ, Woodworth R. FAAD: Face at a distance Proceedings of Spie - the International Society For Optical Engineering. 6944. DOI: 10.1117/12.781497  0.72
2008 Scheirer WJ, Kirkbride SR, Boult TE. Inspec2t: Inexpensive spectrometer color camera technology 2008 Ieee Workshop On Applications of Computer Vision, Wacv. DOI: 10.1109/WACV.2008.4543999  0.691
2008 Eckmann M, Boult TE. Spatio-Temporal consistency and distribetivity as qualities of features 2008 Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops, Cvpr Workshops. DOI: 10.1109/CVPRW.2008.4563137  0.761
2008 Scheirer WJ, Bendale A, Boult TE. Predicting biometric facial recognition failure with similarity surfaces and support vector machines 2008 Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops, Cvpr Workshops. DOI: 10.1109/CVPRW.2008.4563124  0.708
2008 Rocha A, Goldenstein S, Scheirer W, Boult T. The Unseen Challenge data sets 2008 Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops, Cvpr Workshops. DOI: 10.1109/CVPRW.2008.4562987  0.699
2008 Scheirer WJ, Boult TE. A fusion-based approach to enhancing multi-modal biometric recognition system failure prediction and overall performance Btas 2008 - Ieee 2nd International Conference On Biometrics: Theory, Applications and Systems. DOI: 10.1109/BTAS.2008.4699339  0.715
2008 Scheirer WJ, Boult TE. Bio-cryptographic protocols with bipartite biotokens 2008 Biometrics Symposium, Bsym. 9-16. DOI: 10.1109/BSYM.2008.4655516  0.686
2008 Boult TE, Woodworth R. Privacy and security enhancements in biometrics Advances in Biometrics: Sensors, Algorithms and Systems. 423-445. DOI: 10.1007/978-1-84628-921-7_22  0.602
2007 Vogelsong TL, Boult TE, Gardner DW, Woodworth R, Johnson RC, Heflin B. 24/7 security system: 60 FPS color EMCCD camera with integral human recognition Proceedings of Spie - the International Society For Optical Engineering. 6538. DOI: 10.1117/12.719690  0.595
2007 Binglong X, Ramesh V, Ying Z, Boult T. On channel reliability measure training for multi-camera face recognition Proceedings - Ieee Workshop On Applications of Computer Vision, Wacv 2007. DOI: 10.1109/WACV.2007.46  0.574
2007 Zheng G, Wang CJ, Boult TE. Application of projective invariants in hand geometry biometrics Ieee Transactions On Information Forensics and Security. 2: 758-768. DOI: 10.1109/Tifs.2007.908239  0.667
2007 Viswanathan A, Boult TE. Power conservation in ZigBee networks using temporal control 2007 2nd International Symposium On Wireless Pervasive Computing. 175-180. DOI: 10.1109/ISWPC.2007.342596  0.522
2007 Yu L, Boult TE. Systems issues in distributed multi-modal surveillance Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383528  0.561
2007 Zhang T, Boult TE, Johnson RC. Two thresholds are better than one Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383500  0.487
2007 Chattopadhyay A, Boult TE. PrivacyCam: A privacy preserving camera using uCLinux on the blackfin DSP Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383413  0.559
2007 Micheals RJ, Boult TE. Improving variance estimation in biometric systems Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383395  0.755
2007 Boult TE, Scheirer WJ, Woodwork R. Revocable fingerprint biotokens: Accuracy and security analysis Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383110  0.705
2007 Scheirer WJ, Boult TE. Cracking fuzzy vaults and biometric encryption 2007 Biometrics Symposium, Bsym. DOI: 10.1109/Bcc.2007.4430534  0.73
2007 Zhou X, Ippoliti D, Boult T. Hop-count based probabilistic packet dropping: Congestion mitigation with loss rate differentiation Computer Communications. 30: 3859-3869. DOI: 10.1016/J.Comcom.2007.09.010  0.578
2006 Zukoski MJ, Boult T, Iyriboz T. A novel approach to medical image compression. International Journal of Bioinformatics Research and Applications. 2: 89-103. PMID 18048155 DOI: 10.1504/Ijbra.2006.009195  0.757
2006 Zhou X, Ippoliti D, Boult T. HPPD: A hop-count probabilistic packet dropper Ieee International Conference On Communications. 1: 116-121. DOI: 10.1109/ICC.2006.254714  0.533
2006 Boult T, Bowyer K, Phillips J, Ross A, Avidan S, Brown L, Teoh ABJ. IEEE workshop on Privacy Research in Vision (PRIV) Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 2006. DOI: 10.1109/CVPRW.2006.107  0.527
2006 Fogel DB, Piuri V, Boult TE, Carapezza E, Gori M, Intrator N. Message from the chairmen Proceedings of the 2006 Ieee International Conference On Computational Intelligence For Homeland Security and Personal Safety, Cihsps 2006. 2006: iii-iv. DOI: 10.1109/CIHSPS.2006.313299  0.502
2006 Binglong X, Boult T, Ramesh V, Ying Z. Multi-camera face recognition by reliability-based selection Proceedings of the 2006 Ieee International Conference On Computational Intelligence For Homeland Security and Personal Safety, Cihsps 2006. 2006: 18-23. DOI: 10.1109/CIHSPS.2006.313294  0.6
2006 Nayar SK, Branzoi V, Boult TE. Programmable imaging: Towards a flexible camera International Journal of Computer Vision. 70: 7-22. DOI: 10.1007/S11263-005-3102-6  0.567
2006 Brown A, Brown P, Griesbach J, Boult TE. GeoZigBee: A wireless GPS wristwatch tracking solution Proceedings of the Institute of Navigation - 19th International Technical Meeting of the Satellite Division, Ion Gnss 2006. 5: 2883-2888.  0.522
2005 Boult TE. PICO: Privacy through invertible cryptographic obscuration Computer Vision For Interactive and Intelligent Environments 2005. 2005: 27-38. DOI: 10.1109/CVIIE.2005.16  0.516
2005 Li W, Gao X, Boult TE. Predicting biometric system failure Proceedings of the 2005 Ieee International Conference On Computational Intelligence For Homeland Security and Personal Safety, Cihsps 2005. 2005: 57-64. DOI: 10.1109/CIHSPS.2005.1500612  0.494
2005 Riopka T, Boult T. Classification enhancement via biometric pattern perturbation Lecture Notes in Computer Science. 850-859. DOI: 10.1007/11527923_89  0.397
2005 Li W, Gao X, Zhu Y, Ramesh V, Boult TE. On the small sample performance of Boosted classifiers Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 2: 574-581.  0.563
2004 Yu L, Boult TE. Understanding images of graphical user interfaces: A new approach to activity recognition for visual surveillance Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 2004. DOI: 10.1109/CVPR.2004.470  0.555
2004 Boult TE. Geo-spatial active visual surveillance on wireless networks Proceedings - Applied Imagery Pattern Recognition Workshop. 2003: 244-249. DOI: 10.1109/AIPR.2003.1284279  0.502
2004 Boult TE, Gao X, Micheals R, Eckmann M. Omni-directional visual surveillance Image and Vision Computing. 22: 515-534. DOI: 10.1016/J.Imavis.2003.09.005  0.782
2004 Xie B, Ramesh V, Boult T. Sudden illumination change detection using order consistency Image and Vision Computing. 22: 117-125. DOI: 10.1016/J.Imavis.2003.07.003  0.659
2004 Nayar SK, Branzoi V, Boult TE. Programmable imaging using a digital micromirror array Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 1: I436-I443.  0.568
2002 Chen Y, Boult T. Dynamic home agent reassignment in Mobile IP Ieee Wireless Communications and Networking Conference, Wcnc. 1: 44-48. DOI: 10.1109/WCNC.2002.993460  0.528
2002 Bradski G, Boult TE. Guest editorial: Stereo and multi-baseline vision International Journal of Computer Vision. 47: 5. DOI: 10.1023/A:1014590903139  0.586
2002 Bhanu B, Boult T, Gupta A, Michael D. Introduction to the special issue on innovative applications of computer vision Machine Vision and Applications. 13: 109-110. DOI: 10.1007/s001380100073  0.536
2001 Eckmann M, Boult TE. Tubular mosaics Proceedings of Spie - the International Society For Optical Engineering. 4195: 192-203. DOI: 10.1117/12.417301  0.74
2001 Boult TE, Micheals RJ, Gao X, Eckmann M. Into the woods: Visual surveillance of noncooperative and camouflaged targets in complex outdoor settings Proceedings of the Ieee. 89: 1382-1401. DOI: 10.1109/5.959337  0.778
2001 Micheals RJ, Boult TE. Efficient evaluation of classification and recognition systems Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 1.  0.798
2000 Chiang MC, Boult TE. Efficient super-resolution via image warping Image and Vision Computing. 18: 761-771. DOI: 10.1016/S0262-8856(99)00044-X  0.606
2000 Gao X, Boult TE, Coetzee F, Ramesh V. Error analysis of background adaption Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 1: 503-510.  0.565
1999 Micheals RJ, Boult TE. Increasing robustness in self-localization and pose estimation Proceedings of Spie. 3838: 99-113. DOI: 10.1117/12.369246  0.748
1999 Boult TE, Micheals R, Gao X, Lewis P, Power C, Yin W, Erkan A. Frame-rate omnidirectional surveillance and tracking of camouflaged and occluded targets Versus. 48-55. DOI: 10.1109/Vs.1999.780268  0.34
1997 Nayar SK, Fang XS, Boult T. Separation of Reflection Components Using Color and Polarization International Journal of Computer Vision. 21: 163-186. DOI: 10.1023/A:1007937815113  0.607
1996 Gross A, Boult T. Correction to "Recovery of SHGCs From a Single Intensity View" [Erratum] Ieee Transactions On Pattern Analysis and Machine Intelligence. 18: 471. DOI: 10.1109/Tpami.1996.491631  0.331
1996 Gross AD, Boult TE. Recovery of SHGCs from a single intensity view Ieee Transactions On Pattern Analysis and Machine Intelligence. 18: 161-180. DOI: 10.1109/34.481541  0.77
1995 Yener B, Boult TE. Flow trees: A lower bound computation tool with applications. to rearrangeable multihop lightwave network optimization Journal of High Speed Networks. 4: 99-113. DOI: 10.3233/Jhs-1995-4107  0.702
1995 Boult TE, Fenster SD, O’Donnell T. Physics in a fantasy world vs robust statistical estimation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 994: 277-295. DOI: 10.1007/3-540-60477-4_20  0.753
1995 Hebert M, Ponce J, Boult T, Gross A. Report on the 1995 workshop on 3-D object representations in computer vision Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 994: 1-18. DOI: 10.1007/3-540-60477-4_1  0.516
1994 Gross AD, Boult TE. Analyzing skewed symmetries International Journal of Computer Vision. 13: 91-111. DOI: 10.1007/Bf01420797  0.763
1993 Boult TE, Wolberg G. Local Image Reconstruction and Subpixel Restoration Algorithms Cvgip: Graphical Models and Image Processing. 55: 63-77. DOI: 10.1006/Cgip.1993.1005  0.734
1991 Wolff LB, Boult TE. Constraining Object Features Using a Polarization Reflectance Model Ieee Transactions On Pattern Analysis and Machine Intelligence. 13: 635-657. DOI: 10.1109/34.85655  0.744
1990 Boult TE. Communications Dynamic Digital Distance Maps in Two Dimensions Ieee Transactions On Robotics and Automation. 6: 590-597. DOI: 10.1109/70.62048  0.539
1989 Gross AD, Boult TE. Recovery of straight homogeneous generalized cylinders using contour and intensity information Proceedings of Spie - the International Society For Optical Engineering. 1199: 1661-1669. DOI: 10.1117/12.970176  0.563
1988 Boult TE, Gross AD. Recovery of superquadrics from 3-d information Proceedings of Spie - the International Society For Optical Engineering. 848: 358-365. DOI: 10.1117/12.942759  0.563
1988 Boult TE, Moerdler M. An experimental system for the integration of information from stereo and multiple shape from texture algorithms Proceedings of Spie - the International Society For Optical Engineering. 848: 115-123. DOI: 10.1117/12.942727  0.572
1988 Boult T, Sikorski K. Can we approximate zeros of functions with nonzero topological degree? Journal of Complexity. 4: 317-329. DOI: 10.1016/0885-064X(88)90013-1  0.547
1987 Boult TE. Updating distance maps when objects move Proceedings of Spie - the International Society For Optical Engineering. 852: 232-238. DOI: 10.1117/12.968252  0.536
1987 Boult TE. Optimal algorithms: Tools for mathematical modeling Journal of Complexity. 3: 183-200. DOI: 10.1016/0885-064X(87)90026-4  0.578
1986 Boult T, Sikorski K. Complexity of computing topological degree of lipschitz functions in n dimensions Journal of Complexity. 2: 44-59. DOI: 10.1016/0885-064X(86)90022-1  0.542
Show low-probability matches.