Year |
Citation |
Score |
2019 |
Boult TE, Cruz S, Dhamija A, Gunther M, Henrydoss J, Scheirer W. Learning and the Unknown: Surveying Steps toward Open World Recognition Proceedings of the Aaai Conference On Artificial Intelligence. 33: 9801-9807. DOI: 10.1609/aaai.v33i01.33019801 |
0.598 |
|
2019 |
Rozsa A, Günther M, Rudd EM, Boult TE. Facial attributes: Accuracy and adversarial robustness Pattern Recognition Letters. 124: 100-108. DOI: 10.1016/J.Patrec.2017.10.024 |
0.791 |
|
2017 |
Rudd EM, Jain LP, Scheirer WJ, Boult TE. The Extreme Value Machine. Ieee Transactions On Pattern Analysis and Machine Intelligence. PMID 28541894 DOI: 10.1109/Tpami.2017.2707495 |
0.792 |
|
2017 |
Rudd EM, Rozsa A, Gunther M, Boult TE. A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions Ieee Communications Surveys & Tutorials. 19: 1145-1172. DOI: 10.1109/Comst.2016.2636078 |
0.78 |
|
2017 |
Emersic Z, Stepec D, Struc V, Peer P, George A, Ahmad A, Omar E, Boult TE, Safdaii R, Zhou Y, Zafeiriou S, Yaman D, Eyiokur FI, Ekenel HK. The unconstrained ear recognition challenge International Journal of Central Banking. 715-724. DOI: 10.1109/Btas.2017.8272761 |
0.372 |
|
2017 |
Gunther M, Hu P, Herrmann C, Chan CH, Jiang M, Yang S, Dhamija AR, Ramanan D, Beyerer J, Kittler J, Jazaery MA, Nouyed MI, Guo G, Stankiewicz C, Boult TE. Unconstrained Face Detection and Open-Set Face Recognition Challenge International Journal of Central Banking. 697-706. DOI: 10.1109/Btas.2017.8272759 |
0.387 |
|
2017 |
Rozsa A, Gunther M, Boult TE. LOTS about attacking deep features International Journal of Central Banking. 168-176. DOI: 10.1109/Btas.2017.8272695 |
0.784 |
|
2017 |
Gunther M, Rozsa A, Boult TE. AFFACT: Alignment-free facial attribute classification technique International Journal of Central Banking. 90-99. DOI: 10.1109/Btas.2017.8272686 |
0.799 |
|
2016 |
Alsaadi FE, Boult TE. Furthering fingerprint-based authentication: Introducing the true-neighbor template 2016 Ieee Winter Conference On Applications of Computer Vision, Wacv 2016. DOI: 10.1109/WACV.2016.7477674 |
0.564 |
|
2016 |
Alsaadi FE, Boult TE. Perpetuating biometrics for authentication introducing the durable True-Neighbor template Advances in Intelligent Systems and Computing. 448: 161-176. DOI: 10.1007/978-3-319-32467-8_16 |
0.603 |
|
2015 |
Rozsa A, Glock AE, Boult TE. Genetic algorithm attack on minutiae-based fingerprint authentication and protected template fingerprint systems Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 2015: 100-108. DOI: 10.1109/CVPRW.2015.7301325 |
0.58 |
|
2015 |
Bendale A, Boult T. Towards Open World Recognition Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 7: 1893-1902. DOI: 10.1109/CVPR.2015.7298799 |
0.624 |
|
2015 |
Ayodele AO, Rao J, Boult TE. Performance Measurement and Interference Profiling in Multi-tenant Clouds Proceedings - 2015 Ieee 8th International Conference On Cloud Computing, Cloud 2015. 941-949. DOI: 10.1109/CLOUD.2015.128 |
0.513 |
|
2015 |
White R, Burkhart A, George R, Boult T, Chow E. Towards comparable cross-sector risk analyses: A re-examination of the Risk Analysis and Management for Critical Asset Protection (RAMCAP) methodology International Journal of Critical Infrastructure Protection. DOI: 10.1016/J.Ijcip.2016.05.001 |
0.626 |
|
2014 |
Scheirer WJ, Jain LP, Boult TE. Probability Models for Open Set Recognition. Ieee Transactions On Pattern Analysis and Machine Intelligence. 36: 2317-24. PMID 26353070 DOI: 10.1109/Tpami.2014.2321392 |
0.801 |
|
2014 |
Alzahrani H, Boult TE. Remote authentication using vaulted fingerprint verification Proceedings of Spie - the International Society For Optical Engineering. 9075. DOI: 10.1117/12.2053126 |
0.777 |
|
2014 |
Wilber MJ, Rudd E, Heflin B, Lui YM, Boult TE. Exemplar codes for facial attributes and tattoo recognition 2014 Ieee Winter Conference On Applications of Computer Vision, Wacv 2014. 205-212. DOI: 10.1109/WACV.2014.6836099 |
0.743 |
|
2014 |
Scheirer WJ, Jain LP, Boult TE. Probability models for open set recognition Ieee Transactions On Pattern Analysis and Machine Intelligence. 36: 2317-2324. DOI: 10.1109/TPAMI.2014.2321392 |
0.78 |
|
2014 |
Alsolami F, Boult T. CloudStash: Using secret-sharing scheme to secure data, not keys, in multi-clouds Itng 2014 - Proceedings of the 11th International Conference On Information Technology: New Generations. 315-320. DOI: 10.1109/ITNG.2014.119 |
0.554 |
|
2014 |
Albahdal AA, Boult TE. Problems and promises of using the cloud and biometrics Itng 2014 - Proceedings of the 11th International Conference On Information Technology: New Generations. 293-300. DOI: 10.1109/ITNG.2014.112 |
0.554 |
|
2014 |
Bendale A, Boult T. Reliable posterior probability estimation for streaming face recognition Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 56-63. DOI: 10.1109/CVPRW.2014.14 |
0.595 |
|
2014 |
Scheirer WJ, Wilber MJ, Eckmann M, Boult TE. Good recognition is non-metric Pattern Recognition. 47: 2721-2731. DOI: 10.1016/J.Patcog.2014.02.018 |
0.795 |
|
2014 |
White R, Boult T, Chow E. A computational asset vulnerability model for the strategic protection of the critical infrastructure International Journal of Critical Infrastructure Protection. 7: 167-177. DOI: 10.1016/J.Ijcip.2014.06.002 |
0.636 |
|
2014 |
Jain LP, Scheirer WJ, Boult TE. Multi-class open set recognition using probability of inclusion Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8691: 393-409. DOI: 10.1007/978-3-319-10578-9_26 |
0.786 |
|
2013 |
Scheirer WJ, de Rezende Rocha A, Sapkota A, Boult TE. Toward open set recognition. Ieee Transactions On Pattern Analysis and Machine Intelligence. 35: 1757-72. PMID 23682001 DOI: 10.1109/Tpami.2012.256 |
0.808 |
|
2013 |
Sapkota A, Boult TE. GRAB: Generalized region assigned to binary Eurasip Journal On Image and Video Processing. 2013. DOI: 10.1186/1687-5281-2013-35 |
0.738 |
|
2013 |
Sapkota A, Boult TE. GRAB: Generalized region assigned to binary Local binary patterns (LBP)-based image and video analysis Eurasip Journal On Image and Video Processing. 2013. DOI: 10.1186/1687-5281-2013-35 |
0.723 |
|
2013 |
Scheirer WJ, Kumar N, Iyer VN, Belhumeur PN, Boult TE. How reliable are your visual attributes? Proceedings of Spie - the International Society For Optical Engineering. 8712. DOI: 10.1117/12.2018974 |
0.765 |
|
2013 |
Johnson RC, Scheirer WJ, Boult TE. Secure voice based authentication for mobile devices: Vaulted voice verification Proceedings of Spie - the International Society For Optical Engineering. 8712. DOI: 10.1117/12.2015649 |
0.725 |
|
2013 |
Wilber MJ, Scheirer WJ, Leitner P, Heflin B, Zott J, Reinke D, Delaney DK, Boult TE. Animal recognition in the Mojave Desert: Vision tools for field biologists Proceedings of Ieee Workshop On Applications of Computer Vision. 206-213. DOI: 10.1109/WACV.2013.6475020 |
0.7 |
|
2013 |
Felzenszwalb PF, Forsyth DA, Fua P, Boult TE. TPAMI CVPR special section Ieee Transactions On Pattern Analysis and Machine Intelligence. 35: 2819-2820. DOI: 10.1109/Tpami.2013.208 |
0.563 |
|
2013 |
Johnson RC, Boult TE. With vaulted voice verification my voice is my key 2013 Ieee International Conference On Technologies For Homeland Security, Hst 2013. 453-459. DOI: 10.1109/THS.2013.6699047 |
0.537 |
|
2013 |
Jain L, Wilber MJ, Boult TE. Issues in rotational (non-)invariance and image preprocessing Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 76-83. DOI: 10.1109/CVPRW.2013.19 |
0.736 |
|
2013 |
Sapkota A, Boult TE. Large scale unconstrained open set face database Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712756 |
0.745 |
|
2013 |
Sapkota A, Gopalan R, Zavesky E, Boult TE. Appearance, context and co-occurrence ensembles for identity recognition in personal photo collections Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712723 |
0.739 |
|
2013 |
Johnson RC, Boult TE, Scheirer WJ. Voice authentication using short phrases: Examining accuracy, security and privacy issues Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712713 |
0.709 |
|
2013 |
Albahdal AA, Alzahrani H, Jain LP, Boult TE. Trusted BWI: Privacy and trust enhanced biometric web identities Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712712 |
0.705 |
|
2013 |
Scheirer WJ, Bishop W, Boult TE. Beyond PKI: The biocryptographic key infrastructure Security and Privacy in Biometrics. 45-68. DOI: 10.1007/978-1-4471-5230-9_3 |
0.696 |
|
2012 |
Wilber MJ, Boult TE. Secure remote matching with privacy: Scrambled support vector vaulted verification (S 2V 3) Proceedings of Ieee Workshop On Applications of Computer Vision. 169-176. DOI: 10.1109/WACV.2012.6163018 |
0.58 |
|
2012 |
Heflin B, Scheirer W, Boult TE. For your eyes only Proceedings of Ieee Workshop On Applications of Computer Vision. 193-200. DOI: 10.1109/WACV.2012.6163013 |
0.668 |
|
2012 |
Scheirer WJ, Rocha ADR, Parris J, Boult TE. Learning for meta-recognition Ieee Transactions On Information Forensics and Security. 7: 1214-1224. DOI: 10.1109/TIFS.2012.2192430 |
0.695 |
|
2012 |
Sapkota A, Boult T. Context-patch for difficult face recognition Proceedings - 2012 5th Iapr International Conference On Biometrics, Icb 2012. 59-66. DOI: 10.1109/ICB.2012.6199759 |
0.736 |
|
2012 |
Wilber MJ, Scheirer WJ, Boult TE. PRIVV: Private remote iris-authentication with Vaulted Verification Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 97-104. DOI: 10.1109/CVPRW.2012.6239222 |
0.701 |
|
2012 |
Scheirer WJ, Kumar N, Belhumeur PN, Boult TE. Multi-attribute spaces: Calibration for attribute fusion and similarity search Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 2933-2940. DOI: 10.1109/CVPR.2012.6248021 |
0.689 |
|
2012 |
Heflin B, Scheirer W, Boult TE. Detecting and classifying scars, marks, and tattoos found in the wild 2012 Ieee 5th International Conference On Biometrics: Theory, Applications and Systems, Btas 2012. 31-38. DOI: 10.1109/BTAS.2012.6374555 |
0.697 |
|
2011 |
Scheirer WJ, Rocha A, Micheals RJ, Boult TE. Meta-Recognition: The Theory and Practice of Recognition Score Analysis. Ieee Transactions On Pattern Analysis and Machine Intelligence. PMID 21422483 DOI: 10.1109/Tpami.2011.54 |
0.797 |
|
2011 |
Rocha A, Scheirer W, Boult T, Goldenstein S. Vision of the unseen: Current trends and challenges in digital image and video forensics Acm Computing Surveys. 43. DOI: 10.1145/1978802.1978805 |
0.737 |
|
2011 |
Zhang T, Boult T. Realistic stereo error models and finite optimal stereo baselines 2011 Ieee Workshop On Applications of Computer Vision, Wacv 2011. 426-433. DOI: 10.1109/WACV.2011.5711535 |
0.496 |
|
2011 |
Parris J, Wilber M, Heflin B, Rara H, El-Barkouky A, Farag A, Movellan J, Anonymous, Castrilon-Santana M, Lorenzo-Navarro J, Teli MN, Marcel S, Atanasoaei C, Boult TE. Face and eye detection on hard datasets 2011 International Joint Conference On Biometrics, Ijcb 2011. DOI: 10.1109/Ijcb.2011.6117593 |
0.62 |
|
2011 |
Scheirer WJ, Kumar N, Ricanek K, Belhumeur PN, Boult TE. Fusing with context: A Bayesian approach to combining descriptive attributes 2011 International Joint Conference On Biometrics, Ijcb 2011. DOI: 10.1109/Ijcb.2011.6117490 |
0.759 |
|
2011 |
Ayodele A, Henrydoss J, Schrier W, Boult TE. Study of malware threats faced by the typical email user Communications in Computer and Information Science. 196: 513-525. DOI: 10.1007/978-3-642-22540-6_50 |
0.563 |
|
2010 |
Bendale AZ, Boult TE. Id-privacy in large scale biometric systems 2010 Ieee International Workshop On Information Forensics and Security, Wifs 2010. DOI: 10.1109/WIFS.2010.5711439 |
0.512 |
|
2010 |
Scheirer W, Bishop B, Boult T. Beyond PKI: The biocryptographic key infrastructure 2010 Ieee International Workshop On Information Forensics and Security, Wifs 2010. DOI: 10.1109/WIFS.2010.5711435 |
0.696 |
|
2010 |
Boult T, Dandapani R, Polok N, Reddy VK, Stock GN. The bachelor of innovation™ family of degrees: Transforming education in engineering to education in innovation 2010 Ieee Transforming Engineering Education: Creating Interdisciplinary Skills For Complex Global Environments. DOI: 10.1109/TEE.2010.5508826 |
0.508 |
|
2010 |
Heflin B, Parks B, Scheirer W, Boult T. Single image deblurring for a real-time face recognition system Iecon Proceedings (Industrial Electronics Conference). 1185-1192. DOI: 10.1109/IECON.2010.5675537 |
0.73 |
|
2010 |
Sapkota A, Parks B, Scheirer W, Boult T. FACE-GRAB: Face recognition with General Region Assigned to Binary operator 2010 Ieee Computer Society Conference On Computer Vision and Pattern Recognition - Workshops, Cvprw 2010. 82-89. DOI: 10.1109/CVPRW.2010.5544597 |
0.785 |
|
2010 |
Iyer VN, Kirkbride SR, Parks BC, Scheirer WJ, Boult TE. A taxonomy of face-models for system evaluation 2010 Ieee Computer Society Conference On Computer Vision and Pattern Recognition - Workshops, Cvprw 2010. 63-70. DOI: 10.1109/CVPRW.2010.5543603 |
0.712 |
|
2010 |
Heflin B, Scheirer W, Boult TE. Correcting rolling-shutter distortion of CMOS sensors using facial feature detection Ieee 4th International Conference On Biometrics: Theory, Applications and Systems, Btas 2010. DOI: 10.1109/BTAS.2010.5634528 |
0.701 |
|
2010 |
Iyer VN, Scheirer WJ, Boult TE. Face system evaluation toolkit: Recognition is harder than it seems Ieee 4th International Conference On Biometrics: Theory, Applications and Systems, Btas 2010. DOI: 10.1109/BTAS.2010.5634517 |
0.725 |
|
2010 |
Parks B, Boult T. Top-down facilitation of multistage decisions for face recognition Ieee 4th International Conference On Biometrics: Theory, Applications and Systems, Btas 2010. DOI: 10.1109/BTAS.2010.5634485 |
0.551 |
|
2010 |
Scheirer W, Rocha A, Micheals R, Boult T. Robust fusion: Extreme value theory for recognition score normalization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6313: 481-495. DOI: 10.1007/978-3-642-15558-1_35 |
0.764 |
|
2009 |
Scheirer WJ, Rocha A, Heflin B, Boult TE. Difficult detection: A comparison of two different approaches to eye detection for unconstrained environments Ieee 3rd International Conference On Biometrics: Theory, Applications and Systems, Btas 2009. DOI: 10.1109/BTAS.2009.5339040 |
0.693 |
|
2009 |
Scheirer WJ, Boult TE. Bipartite biotokens: Definition, implementation and analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5558: 775-785. DOI: 10.1007/978-3-642-01793-3_79 |
0.68 |
|
2008 |
Boult TE, Scheirer WJ, Woodworth R. FAAD: Face at a distance Proceedings of Spie - the International Society For Optical Engineering. 6944. DOI: 10.1117/12.781497 |
0.719 |
|
2008 |
Scheirer WJ, Kirkbride SR, Boult TE. Inspec2t: Inexpensive spectrometer color camera technology 2008 Ieee Workshop On Applications of Computer Vision, Wacv. DOI: 10.1109/WACV.2008.4543999 |
0.69 |
|
2008 |
Eckmann M, Boult TE. Spatio-Temporal consistency and distribetivity as qualities of features 2008 Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops, Cvpr Workshops. DOI: 10.1109/CVPRW.2008.4563137 |
0.761 |
|
2008 |
Scheirer WJ, Bendale A, Boult TE. Predicting biometric facial recognition failure with similarity surfaces and support vector machines 2008 Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops, Cvpr Workshops. DOI: 10.1109/CVPRW.2008.4563124 |
0.707 |
|
2008 |
Rocha A, Goldenstein S, Scheirer W, Boult T. The Unseen Challenge data sets 2008 Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops, Cvpr Workshops. DOI: 10.1109/CVPRW.2008.4562987 |
0.698 |
|
2008 |
Scheirer WJ, Boult TE. A fusion-based approach to enhancing multi-modal biometric recognition system failure prediction and overall performance Btas 2008 - Ieee 2nd International Conference On Biometrics: Theory, Applications and Systems. DOI: 10.1109/BTAS.2008.4699339 |
0.714 |
|
2008 |
Scheirer WJ, Boult TE. Bio-cryptographic protocols with bipartite biotokens 2008 Biometrics Symposium, Bsym. 9-16. DOI: 10.1109/BSYM.2008.4655516 |
0.685 |
|
2008 |
Boult TE, Woodworth R. Privacy and security enhancements in biometrics Advances in Biometrics: Sensors, Algorithms and Systems. 423-445. DOI: 10.1007/978-1-84628-921-7_22 |
0.601 |
|
2007 |
Vogelsong TL, Boult TE, Gardner DW, Woodworth R, Johnson RC, Heflin B. 24/7 security system: 60 FPS color EMCCD camera with integral human recognition Proceedings of Spie - the International Society For Optical Engineering. 6538. DOI: 10.1117/12.719690 |
0.595 |
|
2007 |
Binglong X, Ramesh V, Ying Z, Boult T. On channel reliability measure training for multi-camera face recognition Proceedings - Ieee Workshop On Applications of Computer Vision, Wacv 2007. DOI: 10.1109/WACV.2007.46 |
0.574 |
|
2007 |
Zheng G, Wang CJ, Boult TE. Application of projective invariants in hand geometry biometrics Ieee Transactions On Information Forensics and Security. 2: 758-768. DOI: 10.1109/Tifs.2007.908239 |
0.665 |
|
2007 |
Viswanathan A, Boult TE. Power conservation in ZigBee networks using temporal control 2007 2nd International Symposium On Wireless Pervasive Computing. 175-180. DOI: 10.1109/ISWPC.2007.342596 |
0.522 |
|
2007 |
Yu L, Boult TE. Systems issues in distributed multi-modal surveillance Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383528 |
0.56 |
|
2007 |
Zhang T, Boult TE, Johnson RC. Two thresholds are better than one Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383500 |
0.487 |
|
2007 |
Chattopadhyay A, Boult TE. PrivacyCam: A privacy preserving camera using uCLinux on the blackfin DSP Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383413 |
0.558 |
|
2007 |
Micheals RJ, Boult TE. Improving variance estimation in biometric systems Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383395 |
0.755 |
|
2007 |
Boult TE, Scheirer WJ, Woodwork R. Revocable fingerprint biotokens: Accuracy and security analysis Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383110 |
0.704 |
|
2007 |
Scheirer WJ, Boult TE. Cracking fuzzy vaults and biometric encryption 2007 Biometrics Symposium, Bsym. DOI: 10.1109/Bcc.2007.4430534 |
0.729 |
|
2007 |
Zhou X, Ippoliti D, Boult T. Hop-count based probabilistic packet dropping: Congestion mitigation with loss rate differentiation Computer Communications. 30: 3859-3869. DOI: 10.1016/J.Comcom.2007.09.010 |
0.577 |
|
2006 |
Zukoski MJ, Boult T, Iyriboz T. A novel approach to medical image compression. International Journal of Bioinformatics Research and Applications. 2: 89-103. PMID 18048155 DOI: 10.1504/Ijbra.2006.009195 |
0.757 |
|
2006 |
Zhou X, Ippoliti D, Boult T. HPPD: A hop-count probabilistic packet dropper Ieee International Conference On Communications. 1: 116-121. DOI: 10.1109/ICC.2006.254714 |
0.533 |
|
2006 |
Boult T, Bowyer K, Phillips J, Ross A, Avidan S, Brown L, Teoh ABJ. IEEE workshop on Privacy Research in Vision (PRIV) Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 2006. DOI: 10.1109/CVPRW.2006.107 |
0.527 |
|
2006 |
Fogel DB, Piuri V, Boult TE, Carapezza E, Gori M, Intrator N. Message from the chairmen Proceedings of the 2006 Ieee International Conference On Computational Intelligence For Homeland Security and Personal Safety, Cihsps 2006. 2006: iii-iv. DOI: 10.1109/CIHSPS.2006.313299 |
0.502 |
|
2006 |
Binglong X, Boult T, Ramesh V, Ying Z. Multi-camera face recognition by reliability-based selection Proceedings of the 2006 Ieee International Conference On Computational Intelligence For Homeland Security and Personal Safety, Cihsps 2006. 2006: 18-23. DOI: 10.1109/CIHSPS.2006.313294 |
0.6 |
|
2006 |
Nayar SK, Branzoi V, Boult TE. Programmable imaging: Towards a flexible camera International Journal of Computer Vision. 70: 7-22. DOI: 10.1007/S11263-005-3102-6 |
0.567 |
|
2006 |
Brown A, Brown P, Griesbach J, Boult TE. GeoZigBee: A wireless GPS wristwatch tracking solution Proceedings of the Institute of Navigation - 19th International Technical Meeting of the Satellite Division, Ion Gnss 2006. 5: 2883-2888. |
0.522 |
|
2005 |
Boult TE. PICO: Privacy through invertible cryptographic obscuration Computer Vision For Interactive and Intelligent Environments 2005. 2005: 27-38. DOI: 10.1109/CVIIE.2005.16 |
0.515 |
|
2005 |
Li W, Gao X, Boult TE. Predicting biometric system failure Proceedings of the 2005 Ieee International Conference On Computational Intelligence For Homeland Security and Personal Safety, Cihsps 2005. 2005: 57-64. DOI: 10.1109/CIHSPS.2005.1500612 |
0.494 |
|
2005 |
Riopka T, Boult T. Classification enhancement via biometric pattern perturbation Lecture Notes in Computer Science. 850-859. DOI: 10.1007/11527923_89 |
0.397 |
|
2005 |
Li W, Gao X, Zhu Y, Ramesh V, Boult TE. On the small sample performance of Boosted classifiers Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 2: 574-581. |
0.562 |
|
2004 |
Yu L, Boult TE. Understanding images of graphical user interfaces: A new approach to activity recognition for visual surveillance Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 2004. DOI: 10.1109/CVPR.2004.470 |
0.554 |
|
2004 |
Boult TE. Geo-spatial active visual surveillance on wireless networks Proceedings - Applied Imagery Pattern Recognition Workshop. 2003: 244-249. DOI: 10.1109/AIPR.2003.1284279 |
0.503 |
|
2004 |
Boult TE, Gao X, Micheals R, Eckmann M. Omni-directional visual surveillance Image and Vision Computing. 22: 515-534. DOI: 10.1016/J.Imavis.2003.09.005 |
0.781 |
|
2004 |
Xie B, Ramesh V, Boult T. Sudden illumination change detection using order consistency Image and Vision Computing. 22: 117-125. DOI: 10.1016/J.Imavis.2003.07.003 |
0.659 |
|
2004 |
Nayar SK, Branzoi V, Boult TE. Programmable imaging using a digital micromirror array Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 1: I436-I443. |
0.568 |
|
2002 |
Chen Y, Boult T. Dynamic home agent reassignment in Mobile IP Ieee Wireless Communications and Networking Conference, Wcnc. 1: 44-48. DOI: 10.1109/WCNC.2002.993460 |
0.528 |
|
2002 |
Bradski G, Boult TE. Guest editorial: Stereo and multi-baseline vision International Journal of Computer Vision. 47: 5. DOI: 10.1023/A:1014590903139 |
0.586 |
|
2002 |
Bhanu B, Boult T, Gupta A, Michael D. Introduction to the special issue on innovative applications of computer vision Machine Vision and Applications. 13: 109-110. DOI: 10.1007/s001380100073 |
0.536 |
|
2001 |
Eckmann M, Boult TE. Tubular mosaics Proceedings of Spie - the International Society For Optical Engineering. 4195: 192-203. DOI: 10.1117/12.417301 |
0.74 |
|
2001 |
Boult TE, Micheals RJ, Gao X, Eckmann M. Into the woods: Visual surveillance of noncooperative and camouflaged targets in complex outdoor settings Proceedings of the Ieee. 89: 1382-1401. DOI: 10.1109/5.959337 |
0.778 |
|
2001 |
Micheals RJ, Boult TE. Efficient evaluation of classification and recognition systems Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 1. |
0.798 |
|
2000 |
Chiang MC, Boult TE. Efficient super-resolution via image warping Image and Vision Computing. 18: 761-771. DOI: 10.1016/S0262-8856(99)00044-X |
0.606 |
|
2000 |
Gao X, Boult TE, Coetzee F, Ramesh V. Error analysis of background adaption Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 1: 503-510. |
0.565 |
|
1999 |
Micheals RJ, Boult TE. Increasing robustness in self-localization and pose estimation Proceedings of Spie. 3838: 99-113. DOI: 10.1117/12.369246 |
0.748 |
|
1999 |
Boult TE, Micheals R, Gao X, Lewis P, Power C, Yin W, Erkan A. Frame-rate omnidirectional surveillance and tracking of camouflaged and occluded targets Versus. 48-55. DOI: 10.1109/Vs.1999.780268 |
0.34 |
|
1997 |
Nayar SK, Fang XS, Boult T. Separation of Reflection Components Using Color and Polarization International Journal of Computer Vision. 21: 163-186. DOI: 10.1023/A:1007937815113 |
0.607 |
|
1996 |
Gross A, Boult T. Correction to "Recovery of SHGCs From a Single Intensity View" [Erratum] Ieee Transactions On Pattern Analysis and Machine Intelligence. 18: 471. DOI: 10.1109/Tpami.1996.491631 |
0.331 |
|
1996 |
Gross AD, Boult TE. Recovery of SHGCs from a single intensity view Ieee Transactions On Pattern Analysis and Machine Intelligence. 18: 161-180. DOI: 10.1109/34.481541 |
0.77 |
|
1995 |
Yener B, Boult TE. Flow trees: A lower bound computation tool with applications. to rearrangeable multihop lightwave network optimization Journal of High Speed Networks. 4: 99-113. DOI: 10.3233/Jhs-1995-4107 |
0.701 |
|
1995 |
Boult TE, Fenster SD, O’Donnell T. Physics in a fantasy world vs robust statistical estimation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 994: 277-295. DOI: 10.1007/3-540-60477-4_20 |
0.753 |
|
1995 |
Hebert M, Ponce J, Boult T, Gross A. Report on the 1995 workshop on 3-D object representations in computer vision Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 994: 1-18. DOI: 10.1007/3-540-60477-4_1 |
0.516 |
|
1994 |
Gross AD, Boult TE. Analyzing skewed symmetries International Journal of Computer Vision. 13: 91-111. DOI: 10.1007/Bf01420797 |
0.763 |
|
1993 |
Boult TE, Wolberg G. Local Image Reconstruction and Subpixel Restoration Algorithms Cvgip: Graphical Models and Image Processing. 55: 63-77. DOI: 10.1006/Cgip.1993.1005 |
0.734 |
|
1991 |
Wolff LB, Boult TE. Constraining Object Features Using a Polarization Reflectance Model Ieee Transactions On Pattern Analysis and Machine Intelligence. 13: 635-657. DOI: 10.1109/34.85655 |
0.744 |
|
1990 |
Boult TE. Communications Dynamic Digital Distance Maps in Two Dimensions Ieee Transactions On Robotics and Automation. 6: 590-597. DOI: 10.1109/70.62048 |
0.539 |
|
1989 |
Gross AD, Boult TE. Recovery of straight homogeneous generalized cylinders using contour and intensity information Proceedings of Spie - the International Society For Optical Engineering. 1199: 1661-1669. DOI: 10.1117/12.970176 |
0.563 |
|
1988 |
Boult TE, Gross AD. Recovery of superquadrics from 3-d information Proceedings of Spie - the International Society For Optical Engineering. 848: 358-365. DOI: 10.1117/12.942759 |
0.563 |
|
1988 |
Boult TE, Moerdler M. An experimental system for the integration of information from stereo and multiple shape from texture algorithms Proceedings of Spie - the International Society For Optical Engineering. 848: 115-123. DOI: 10.1117/12.942727 |
0.572 |
|
1988 |
Boult T, Sikorski K. Can we approximate zeros of functions with nonzero topological degree? Journal of Complexity. 4: 317-329. DOI: 10.1016/0885-064X(88)90013-1 |
0.547 |
|
1987 |
Boult TE. Updating distance maps when objects move Proceedings of Spie - the International Society For Optical Engineering. 852: 232-238. DOI: 10.1117/12.968252 |
0.536 |
|
1987 |
Boult TE. Optimal algorithms: Tools for mathematical modeling Journal of Complexity. 3: 183-200. DOI: 10.1016/0885-064X(87)90026-4 |
0.578 |
|
1986 |
Boult T, Sikorski K. Complexity of computing topological degree of lipschitz functions in n dimensions Journal of Complexity. 2: 44-59. DOI: 10.1016/0885-064X(86)90022-1 |
0.542 |
|
Show low-probability matches. |