Terry Boult - Publications

Affiliations: 
Lehigh University, Bethlehem, PA, United States 
Area:
Computer Science

113 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Alsaadi FE, Boult TE. Furthering fingerprint-based authentication: Introducing the true-neighbor template 2016 Ieee Winter Conference On Applications of Computer Vision, Wacv 2016. DOI: 10.1109/WACV.2016.7477674  0.544
2016 Alsaadi FE, Boult TE. Perpetuating biometrics for authentication introducing the durable True-Neighbor template Advances in Intelligent Systems and Computing. 448: 161-176. DOI: 10.1007/978-3-319-32467-8_16  0.59
2015 Rozsa A, Glock AE, Boult TE. Genetic algorithm attack on minutiae-based fingerprint authentication and protected template fingerprint systems Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 2015: 100-108. DOI: 10.1109/CVPRW.2015.7301325  0.567
2015 Bendale A, Boult T. Towards Open World Recognition Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 7: 1893-1902. DOI: 10.1109/CVPR.2015.7298799  0.598
2015 Ayodele AO, Rao J, Boult TE. Performance Measurement and Interference Profiling in Multi-tenant Clouds Proceedings - 2015 Ieee 8th International Conference On Cloud Computing, Cloud 2015. 941-949. DOI: 10.1109/CLOUD.2015.128  0.507
2015 White R, Burkhart A, George R, Boult T, Chow E. Towards comparable cross-sector risk analyses: A re-examination of the Risk Analysis and Management for Critical Asset Protection (RAMCAP) methodology International Journal of Critical Infrastructure Protection. DOI: 10.1016/J.Ijcip.2016.05.001  0.522
2014 Scheirer WJ, Jain LP, Boult TE. Probability Models for Open Set Recognition. Ieee Transactions On Pattern Analysis and Machine Intelligence. 36: 2317-24. PMID 26353070 DOI: 10.1109/Tpami.2014.2321392  0.571
2014 Alzahrani H, Boult TE. Remote authentication using vaulted fingerprint verification Proceedings of Spie - the International Society For Optical Engineering. 9075. DOI: 10.1117/12.2053126  0.563
2014 Wilber MJ, Rudd E, Heflin B, Lui YM, Boult TE. Exemplar codes for facial attributes and tattoo recognition 2014 Ieee Winter Conference On Applications of Computer Vision, Wacv 2014. 205-212. DOI: 10.1109/WACV.2014.6836099  0.55
2014 Scheirer WJ, Jain LP, Boult TE. Probability models for open set recognition Ieee Transactions On Pattern Analysis and Machine Intelligence. 36: 2317-2324. DOI: 10.1109/TPAMI.2014.2321392  0.539
2014 Alsolami F, Boult T. CloudStash: Using secret-sharing scheme to secure data, not keys, in multi-clouds Itng 2014 - Proceedings of the 11th International Conference On Information Technology: New Generations. 315-320. DOI: 10.1109/ITNG.2014.119  0.55
2014 Albahdal AA, Boult TE. Problems and promises of using the cloud and biometrics Itng 2014 - Proceedings of the 11th International Conference On Information Technology: New Generations. 293-300. DOI: 10.1109/ITNG.2014.112  0.548
2014 Bendale A, Boult T. Reliable posterior probability estimation for streaming face recognition Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 56-63. DOI: 10.1109/CVPRW.2014.14  0.564
2014 Scheirer WJ, Wilber MJ, Eckmann M, Boult TE. Good recognition is non-metric Pattern Recognition. 47: 2721-2731. DOI: 10.1016/J.Patcog.2014.02.018  0.57
2014 White R, Boult T, Chow E. A computational asset vulnerability model for the strategic protection of the critical infrastructure International Journal of Critical Infrastructure Protection. 7: 167-177. DOI: 10.1016/J.Ijcip.2014.06.002  0.536
2014 Jain LP, Scheirer WJ, Boult TE. Multi-class open set recognition using probability of inclusion Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8691: 393-409. DOI: 10.1007/978-3-319-10578-9_26  0.546
2013 Scheirer WJ, de Rezende Rocha A, Sapkota A, Boult TE. Toward open set recognition. Ieee Transactions On Pattern Analysis and Machine Intelligence. 35: 1757-72. PMID 23682001 DOI: 10.1109/Tpami.2012.256  0.584
2013 Sapkota A, Boult TE. GRAB: Generalized region assigned to binary Eurasip Journal On Image and Video Processing. 2013. DOI: 10.1186/1687-5281-2013-35  0.567
2013 Sapkota A, Boult TE. GRAB: Generalized region assigned to binary Local binary patterns (LBP)-based image and video analysis Eurasip Journal On Image and Video Processing. 2013. DOI: 10.1186/1687-5281-2013-35  0.57
2013 Scheirer WJ, Kumar N, Iyer VN, Belhumeur PN, Boult TE. How reliable are your visual attributes? Proceedings of Spie - the International Society For Optical Engineering. 8712. DOI: 10.1117/12.2018974  0.59
2013 Johnson RC, Scheirer WJ, Boult TE. Secure voice based authentication for mobile devices: Vaulted voice verification Proceedings of Spie - the International Society For Optical Engineering. 8712. DOI: 10.1117/12.2015649  0.545
2013 Wilber MJ, Scheirer WJ, Leitner P, Heflin B, Zott J, Reinke D, Delaney DK, Boult TE. Animal recognition in the Mojave Desert: Vision tools for field biologists Proceedings of Ieee Workshop On Applications of Computer Vision. 206-213. DOI: 10.1109/WACV.2013.6475020  0.515
2013 Felzenszwalb PF, Forsyth DA, Fua P, Boult TE. TPAMI CVPR special section Ieee Transactions On Pattern Analysis and Machine Intelligence. 35: 2819-2820. DOI: 10.1109/Tpami.2013.208  0.506
2013 Johnson RC, Boult TE. With vaulted voice verification my voice is my key 2013 Ieee International Conference On Technologies For Homeland Security, Hst 2013. 453-459. DOI: 10.1109/THS.2013.6699047  0.525
2013 Jain L, Wilber MJ, Boult TE. Issues in rotational (non-)invariance and image preprocessing Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 76-83. DOI: 10.1109/CVPRW.2013.19  0.582
2013 Sapkota A, Boult TE. Large scale unconstrained open set face database Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712756  0.598
2013 Sapkota A, Gopalan R, Zavesky E, Boult TE. Appearance, context and co-occurrence ensembles for identity recognition in personal photo collections Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712723  0.583
2013 Johnson RC, Boult TE, Scheirer WJ. Voice authentication using short phrases: Examining accuracy, security and privacy issues Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712713  0.546
2013 Albahdal AA, Alzahrani H, Jain LP, Boult TE. Trusted BWI: Privacy and trust enhanced biometric web identities Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712712  0.556
2013 Scheirer WJ, Bishop W, Boult TE. Beyond PKI: The biocryptographic key infrastructure Security and Privacy in Biometrics. 45-68. DOI: 10.1007/978-1-4471-5230-9_3  0.526
2012 Wilber MJ, Boult TE. Secure remote matching with privacy: Scrambled support vector vaulted verification (S 2V 3) Proceedings of Ieee Workshop On Applications of Computer Vision. 169-176. DOI: 10.1109/WACV.2012.6163018  0.576
2012 Heflin B, Scheirer W, Boult TE. For your eyes only Proceedings of Ieee Workshop On Applications of Computer Vision. 193-200. DOI: 10.1109/WACV.2012.6163013  0.473
2012 Scheirer WJ, Rocha ADR, Parris J, Boult TE. Learning for meta-recognition Ieee Transactions On Information Forensics and Security. 7: 1214-1224. DOI: 10.1109/TIFS.2012.2192430  0.498
2012 Sapkota A, Boult T. Context-patch for difficult face recognition Proceedings - 2012 5th Iapr International Conference On Biometrics, Icb 2012. 59-66. DOI: 10.1109/ICB.2012.6199759  0.586
2012 Wilber MJ, Scheirer WJ, Boult TE. PRIVV: Private remote iris-authentication with Vaulted Verification Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 97-104. DOI: 10.1109/CVPRW.2012.6239222  0.533
2012 Scheirer WJ, Kumar N, Belhumeur PN, Boult TE. Multi-attribute spaces: Calibration for attribute fusion and similarity search Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 2933-2940. DOI: 10.1109/CVPR.2012.6248021  0.499
2012 Heflin B, Scheirer W, Boult TE. Detecting and classifying scars, marks, and tattoos found in the wild 2012 Ieee 5th International Conference On Biometrics: Theory, Applications and Systems, Btas 2012. 31-38. DOI: 10.1109/BTAS.2012.6374555  0.505
2011 Scheirer WJ, Rocha A, Micheals RJ, Boult TE. Meta-Recognition: The Theory and Practice of Recognition Score Analysis. Ieee Transactions On Pattern Analysis and Machine Intelligence. PMID 21422483 DOI: 10.1109/Tpami.2011.54  0.578
2011 Rocha A, Scheirer W, Boult T, Goldenstein S. Vision of the unseen: Current trends and challenges in digital image and video forensics Acm Computing Surveys. 43. DOI: 10.1145/1978802.1978805  0.551
2011 Zhang T, Boult T. Realistic stereo error models and finite optimal stereo baselines 2011 Ieee Workshop On Applications of Computer Vision, Wacv 2011. 426-433. DOI: 10.1109/WACV.2011.5711535  0.483
2011 Parris J, Wilber M, Heflin B, Rara H, El-Barkouky A, Farag A, Movellan J, Anonymous, Castrilon-Santana M, Lorenzo-Navarro J, Teli MN, Marcel S, Atanasoaei C, Boult TE. Face and eye detection on hard datasets 2011 International Joint Conference On Biometrics, Ijcb 2011. DOI: 10.1109/Ijcb.2011.6117593  0.563
2011 Scheirer WJ, Kumar N, Ricanek K, Belhumeur PN, Boult TE. Fusing with context: A Bayesian approach to combining descriptive attributes 2011 International Joint Conference On Biometrics, Ijcb 2011. DOI: 10.1109/Ijcb.2011.6117490  0.576
2011 Ayodele A, Henrydoss J, Schrier W, Boult TE. Study of malware threats faced by the typical email user Communications in Computer and Information Science. 196: 513-525. DOI: 10.1007/978-3-642-22540-6_50  0.549
2010 Bendale AZ, Boult TE. Id-privacy in large scale biometric systems 2010 Ieee International Workshop On Information Forensics and Security, Wifs 2010. DOI: 10.1109/WIFS.2010.5711439  0.5
2010 Scheirer W, Bishop B, Boult T. Beyond PKI: The biocryptographic key infrastructure 2010 Ieee International Workshop On Information Forensics and Security, Wifs 2010. DOI: 10.1109/WIFS.2010.5711435  0.526
2010 Boult T, Dandapani R, Polok N, Reddy VK, Stock GN. The bachelor of innovation™ family of degrees: Transforming education in engineering to education in innovation 2010 Ieee Transforming Engineering Education: Creating Interdisciplinary Skills For Complex Global Environments. DOI: 10.1109/TEE.2010.5508826  0.493
2010 Heflin B, Parks B, Scheirer W, Boult T. Single image deblurring for a real-time face recognition system Iecon Proceedings (Industrial Electronics Conference). 1185-1192. DOI: 10.1109/IECON.2010.5675537  0.562
2010 Sapkota A, Parks B, Scheirer W, Boult T. FACE-GRAB: Face recognition with General Region Assigned to Binary operator 2010 Ieee Computer Society Conference On Computer Vision and Pattern Recognition - Workshops, Cvprw 2010. 82-89. DOI: 10.1109/CVPRW.2010.5544597  0.553
2010 Iyer VN, Kirkbride SR, Parks BC, Scheirer WJ, Boult TE. A taxonomy of face-models for system evaluation 2010 Ieee Computer Society Conference On Computer Vision and Pattern Recognition - Workshops, Cvprw 2010. 63-70. DOI: 10.1109/CVPRW.2010.5543603  0.54
2010 Heflin B, Scheirer W, Boult TE. Correcting rolling-shutter distortion of CMOS sensors using facial feature detection Ieee 4th International Conference On Biometrics: Theory, Applications and Systems, Btas 2010. DOI: 10.1109/BTAS.2010.5634528  0.515
2010 Iyer VN, Scheirer WJ, Boult TE. Face system evaluation toolkit: Recognition is harder than it seems Ieee 4th International Conference On Biometrics: Theory, Applications and Systems, Btas 2010. DOI: 10.1109/BTAS.2010.5634517  0.554
2010 Parks B, Boult T. Top-down facilitation of multistage decisions for face recognition Ieee 4th International Conference On Biometrics: Theory, Applications and Systems, Btas 2010. DOI: 10.1109/BTAS.2010.5634485  0.533
2010 Scheirer W, Rocha A, Micheals R, Boult T. Robust fusion: Extreme value theory for recognition score normalization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6313: 481-495. DOI: 10.1007/978-3-642-15558-1_35  0.508
2009 Scheirer WJ, Rocha A, Heflin B, Boult TE. Difficult detection: A comparison of two different approaches to eye detection for unconstrained environments Ieee 3rd International Conference On Biometrics: Theory, Applications and Systems, Btas 2009. DOI: 10.1109/BTAS.2009.5339040  0.506
2009 Scheirer WJ, Boult TE. Bipartite biotokens: Definition, implementation and analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5558: 775-785. DOI: 10.1007/978-3-642-01793-3_79  0.493
2008 Boult TE, Scheirer WJ, Woodworth R. FAAD: Face at a distance Proceedings of Spie - the International Society For Optical Engineering. 6944. DOI: 10.1117/12.781497  0.549
2008 Scheirer WJ, Kirkbride SR, Boult TE. Inspec2t: Inexpensive spectrometer color camera technology 2008 Ieee Workshop On Applications of Computer Vision, Wacv. DOI: 10.1109/WACV.2008.4543999  0.504
2008 Eckmann M, Boult TE. Spatio-Temporal consistency and distribetivity as qualities of features 2008 Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops, Cvpr Workshops. DOI: 10.1109/CVPRW.2008.4563137  0.503
2008 Scheirer WJ, Bendale A, Boult TE. Predicting biometric facial recognition failure with similarity surfaces and support vector machines 2008 Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops, Cvpr Workshops. DOI: 10.1109/CVPRW.2008.4563124  0.519
2008 Rocha A, Goldenstein S, Scheirer W, Boult T. The Unseen Challenge data sets 2008 Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops, Cvpr Workshops. DOI: 10.1109/CVPRW.2008.4562987  0.512
2008 Scheirer WJ, Boult TE. A fusion-based approach to enhancing multi-modal biometric recognition system failure prediction and overall performance Btas 2008 - Ieee 2nd International Conference On Biometrics: Theory, Applications and Systems. DOI: 10.1109/BTAS.2008.4699339  0.536
2008 Scheirer WJ, Boult TE. Bio-cryptographic protocols with bipartite biotokens 2008 Biometrics Symposium, Bsym. 9-16. DOI: 10.1109/BSYM.2008.4655516  0.511
2008 Boult TE, Woodworth R. Privacy and security enhancements in biometrics Advances in Biometrics: Sensors, Algorithms and Systems. 423-445. DOI: 10.1007/978-1-84628-921-7_22  0.588
2007 Vogelsong TL, Boult TE, Gardner DW, Woodworth R, Johnson RC, Heflin B. 24/7 security system: 60 FPS color EMCCD camera with integral human recognition Proceedings of Spie - the International Society For Optical Engineering. 6538. DOI: 10.1117/12.719690  0.577
2007 Binglong X, Ramesh V, Ying Z, Boult T. On channel reliability measure training for multi-camera face recognition Proceedings - Ieee Workshop On Applications of Computer Vision, Wacv 2007. DOI: 10.1109/WACV.2007.46  0.553
2007 Zheng G, Wang CJ, Boult TE. Application of projective invariants in hand geometry biometrics Ieee Transactions On Information Forensics and Security. 2: 758-768. DOI: 10.1109/Tifs.2007.908239  0.546
2007 Viswanathan A, Boult TE. Power conservation in ZigBee networks using temporal control 2007 2nd International Symposium On Wireless Pervasive Computing. 175-180. DOI: 10.1109/ISWPC.2007.342596  0.507
2007 Yu L, Boult TE. Systems issues in distributed multi-modal surveillance Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383528  0.546
2007 Zhang T, Boult TE, Johnson RC. Two thresholds are better than one Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383500  0.473
2007 Chattopadhyay A, Boult TE. PrivacyCam: A privacy preserving camera using uCLinux on the blackfin DSP Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383413  0.553
2007 Micheals RJ, Boult TE. Improving variance estimation in biometric systems Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383395  0.489
2007 Boult TE, Scheirer WJ, Woodwork R. Revocable fingerprint biotokens: Accuracy and security analysis Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. DOI: 10.1109/CVPR.2007.383110  0.535
2007 Scheirer WJ, Boult TE. Cracking fuzzy vaults and biometric encryption 2007 Biometrics Symposium, Bsym. DOI: 10.1109/Bcc.2007.4430534  0.544
2007 Zhou X, Ippoliti D, Boult T. Hop-count based probabilistic packet dropping: Congestion mitigation with loss rate differentiation Computer Communications. 30: 3859-3869. DOI: 10.1016/J.Comcom.2007.09.010  0.524
2006 Zukoski MJ, Boult T, Iyriboz T. A novel approach to medical image compression. International Journal of Bioinformatics Research and Applications. 2: 89-103. PMID 18048155 DOI: 10.1504/Ijbra.2006.009195  0.51
2006 Zhou X, Ippoliti D, Boult T. HPPD: A hop-count probabilistic packet dropper Ieee International Conference On Communications. 1: 116-121. DOI: 10.1109/ICC.2006.254714  0.525
2006 Boult T, Bowyer K, Phillips J, Ross A, Avidan S, Brown L, Teoh ABJ. IEEE workshop on Privacy Research in Vision (PRIV) Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 2006. DOI: 10.1109/CVPRW.2006.107  0.521
2006 Fogel DB, Piuri V, Boult TE, Carapezza E, Gori M, Intrator N. Message from the chairmen Proceedings of the 2006 Ieee International Conference On Computational Intelligence For Homeland Security and Personal Safety, Cihsps 2006. 2006: iii-iv. DOI: 10.1109/CIHSPS.2006.313299  0.5
2006 Binglong X, Boult T, Ramesh V, Ying Z. Multi-camera face recognition by reliability-based selection Proceedings of the 2006 Ieee International Conference On Computational Intelligence For Homeland Security and Personal Safety, Cihsps 2006. 2006: 18-23. DOI: 10.1109/CIHSPS.2006.313294  0.577
2006 Nayar SK, Branzoi V, Boult TE. Programmable imaging: Towards a flexible camera International Journal of Computer Vision. 70: 7-22. DOI: 10.1007/S11263-005-3102-6  0.552
2006 Brown A, Brown P, Griesbach J, Boult TE. GeoZigBee: A wireless GPS wristwatch tracking solution Proceedings of the Institute of Navigation - 19th International Technical Meeting of the Satellite Division, Ion Gnss 2006. 5: 2883-2888.  0.511
2005 Boult TE. PICO: Privacy through invertible cryptographic obscuration Computer Vision For Interactive and Intelligent Environments 2005. 2005: 27-38. DOI: 10.1109/CVIIE.2005.16  0.514
2005 Li W, Gao X, Boult TE. Predicting biometric system failure Proceedings of the 2005 Ieee International Conference On Computational Intelligence For Homeland Security and Personal Safety, Cihsps 2005. 2005: 57-64. DOI: 10.1109/CIHSPS.2005.1500612  0.481
2005 Li W, Gao X, Zhu Y, Ramesh V, Boult TE. On the small sample performance of Boosted classifiers Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 2: 574-581.  0.532
2004 Yu L, Boult TE. Understanding images of graphical user interfaces: A new approach to activity recognition for visual surveillance Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 2004. DOI: 10.1109/CVPR.2004.470  0.537
2004 Boult TE. Geo-spatial active visual surveillance on wireless networks Proceedings - Applied Imagery Pattern Recognition Workshop. 2003: 244-249. DOI: 10.1109/AIPR.2003.1284279  0.487
2004 Boult TE, Gao X, Micheals R, Eckmann M. Omni-directional visual surveillance Image and Vision Computing. 22: 515-534. DOI: 10.1016/J.Imavis.2003.09.005  0.567
2004 Xie B, Ramesh V, Boult T. Sudden illumination change detection using order consistency Image and Vision Computing. 22: 117-125. DOI: 10.1016/J.Imavis.2003.07.003  0.617
2004 Nayar SK, Branzoi V, Boult TE. Programmable imaging using a digital micromirror array Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 1: I436-I443.  0.553
2002 Chen Y, Boult T. Dynamic home agent reassignment in Mobile IP Ieee Wireless Communications and Networking Conference, Wcnc. 1: 44-48. DOI: 10.1109/WCNC.2002.993460  0.513
2002 Bradski G, Boult TE. Guest editorial: Stereo and multi-baseline vision International Journal of Computer Vision. 47: 5. DOI: 10.1023/A:1014590903139  0.532
2002 Bhanu B, Boult T, Gupta A, Michael D. Introduction to the special issue on innovative applications of computer vision Machine Vision and Applications. 13: 109-110. DOI: 10.1007/s001380100073  0.526
2001 Eckmann M, Boult TE. Tubular mosaics Proceedings of Spie - the International Society For Optical Engineering. 4195: 192-203. DOI: 10.1117/12.417301  0.467
2001 Boult TE, Micheals RJ, Gao X, Eckmann M. Into the woods: Visual surveillance of noncooperative and camouflaged targets in complex outdoor settings Proceedings of the Ieee. 89: 1382-1401. DOI: 10.1109/5.959337  0.551
2001 Micheals RJ, Boult TE. Efficient evaluation of classification and recognition systems Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 1.  0.571
2000 Chiang MC, Boult TE. Efficient super-resolution via image warping Image and Vision Computing. 18: 761-771. DOI: 10.1016/S0262-8856(99)00044-X  0.547
2000 Gao X, Boult TE, Coetzee F, Ramesh V. Error analysis of background adaption Proceedings of the Ieee Computer Society Conference On Computer Vision and Pattern Recognition. 1: 503-510.  0.547
1997 Nayar SK, Fang XS, Boult T. Separation of Reflection Components Using Color and Polarization International Journal of Computer Vision. 21: 163-186. DOI: 10.1023/A:1007937815113  0.545
1996 Gross AD, Boult TE. Recovery of SHGCs from a single intensity view Ieee Transactions On Pattern Analysis and Machine Intelligence. 18: 161-180. DOI: 10.1109/34.481541  0.555
1995 Yener B, Boult TE. Flow trees: A lower bound computation tool with applications. to rearrangeable multihop lightwave network optimization Journal of High Speed Networks. 4: 99-113. DOI: 10.3233/Jhs-1995-4107  0.511
1995 Boult TE, Fenster SD, O’Donnell T. Physics in a fantasy world vs robust statistical estimation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 994: 277-295. DOI: 10.1007/3-540-60477-4_20  0.487
1995 Hebert M, Ponce J, Boult T, Gross A. Report on the 1995 workshop on 3-D object representations in computer vision Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 994: 1-18. DOI: 10.1007/3-540-60477-4_1  0.504
1994 Gross AD, Boult TE. Analyzing skewed symmetries International Journal of Computer Vision. 13: 91-111. DOI: 10.1007/Bf01420797  0.538
1993 Boult TE, Wolberg G. Local Image Reconstruction and Subpixel Restoration Algorithms Cvgip: Graphical Models and Image Processing. 55: 63-77. DOI: 10.1006/Cgip.1993.1005  0.543
1991 Wolff LB, Boult TE. Constraining Object Features Using a Polarization Reflectance Model Ieee Transactions On Pattern Analysis and Machine Intelligence. 13: 635-657. DOI: 10.1109/34.85655  0.524
1990 Boult TE. Communications Dynamic Digital Distance Maps in Two Dimensions Ieee Transactions On Robotics and Automation. 6: 590-597. DOI: 10.1109/70.62048  0.524
1989 Gross AD, Boult TE. Recovery of straight homogeneous generalized cylinders using contour and intensity information Proceedings of Spie - the International Society For Optical Engineering. 1199: 1661-1669. DOI: 10.1117/12.970176  0.541
1988 Boult TE, Gross AD. Recovery of superquadrics from 3-d information Proceedings of Spie - the International Society For Optical Engineering. 848: 358-365. DOI: 10.1117/12.942759  0.549
1988 Boult TE, Moerdler M. An experimental system for the integration of information from stereo and multiple shape from texture algorithms Proceedings of Spie - the International Society For Optical Engineering. 848: 115-123. DOI: 10.1117/12.942727  0.555
1988 Boult T, Sikorski K. Can we approximate zeros of functions with nonzero topological degree? Journal of Complexity. 4: 317-329. DOI: 10.1016/0885-064X(88)90013-1  0.486
1987 Boult TE. Updating distance maps when objects move Proceedings of Spie - the International Society For Optical Engineering. 852: 232-238. DOI: 10.1117/12.968252  0.521
1987 Boult TE. Optimal algorithms: Tools for mathematical modeling Journal of Complexity. 3: 183-200. DOI: 10.1016/0885-064X(87)90026-4  0.519
1986 Boult T, Sikorski K. Complexity of computing topological degree of lipschitz functions in n dimensions Journal of Complexity. 2: 44-59. DOI: 10.1016/0885-064X(86)90022-1  0.485
Show low-probability matches.