Year |
Citation |
Score |
2014 |
Mayron LM, AlShehri MN. Evaluating the use of models of visual attention to predict graphical passwords Proceedings of the 2014 Acm Southeast Regional Conference, Acm SE 2014. DOI: 10.1145/2638404.2638471 |
0.307 |
|
2013 |
Mayron LM. A comparison of biologically-inspired methods for unsupervised salient object detection Electronic Proceedings of the 2013 Ieee International Conference On Multimedia and Expo Workshops, Icmew 2013. DOI: 10.1109/ICMEW.2013.6618299 |
0.304 |
|
2009 |
Borba GB, Gamba HR, Marques O, Mayron LM. Extraction of salient regions of interest using visual attention models Proceedings of Spie - the International Society For Optical Engineering. 7255. DOI: 10.1117/12.807677 |
0.621 |
|
2008 |
Mayron LM, Marques O. Using a game to evaluate image retrieval, organization, and annotation Proceedings - International Conference On Image Processing, Icip. 77-80. DOI: 10.1109/ICIP.2008.4711695 |
0.592 |
|
2007 |
Marques O, Mayron LM, Borba GB, Gamba HR. An attention-driven model for grouping similar images with image retrieval applications Eurasip Journal On Advances in Signal Processing. 2007. DOI: 10.1155/2007/43450 |
0.633 |
|
2007 |
Marques O, Mayron LM, Socek D, Borba GB, Gamba HR. An attention-based method for extracting salient regions of interest from stereo images Visapp 2007 - 2nd International Conference On Computer Vision Theory and Applications, Proceedings. 294-297. |
0.374 |
|
2007 |
Mayron LM, Marques O. Design of a web-based interface for image retrieval systems Webist 2007 - 3rd International Conference On Web Information Systems and Technologies, Proceedings. 328-333. |
0.608 |
|
2006 |
Kalva H, Christodoulou L, Mayron LM, Marques O, Furht B. Design and evaluation of a 3D video system based on H.264 view coding Proceedings of the International Workshop On Network and Operating System Support For Digital Audio and Video. DOI: 10.1145/1378191.1378207 |
0.516 |
|
2006 |
Marques O, Mayron LM, Borba GB, Gamba HR. Using visual attention to extract regions of interest in the context of image retrieval Proceedings of the Annual Southeast Conference. 2006: 638-643. DOI: 10.1145/1185448.1185588 |
0.59 |
|
2006 |
Christodoulou L, Mayron LM, Kalva H, Marques O, Furht B. 3D TV using MPEG-2 and H.264 view coding and autostereoscopic displays Proceedings of the 14th Annual Acm International Conference On Multimedia, Mm 2006. 505-506. DOI: 10.1145/1180639.1180747 |
0.492 |
|
2006 |
Borba GB, Gamba HR, Marques O, Mayron LM. An unsupervised method for clustering images based on their salient regions of interest Proceedings of the 14th Annual Acm International Conference On Multimedia, Mm 2006. 145-148. DOI: 10.1145/1180639.1180681 |
0.538 |
|
2006 |
Mayron LM, Marques O, Borba GB, Gamba HR, Nedovic V. A forward-looking user interface for CBIR and CFIR systems Ism 2006 - 8th Ieee International Symposium On Multimedia. 779-780. DOI: 10.1109/ISM.2006.2 |
0.469 |
|
2006 |
Marques O, Mayron LM, Borba GB, Gamba HR. On the potential of incorporating knowledge of human visual attention into CBIR systems 2006 Ieee International Conference On Multimedia and Expo, Icme 2006 - Proceedings. 2006: 773-776. DOI: 10.1109/ICME.2006.262953 |
0.5 |
|
2006 |
Marques O, Auger P, Mayron LM. SimViKi: A tool for the simulation of secure video communication systems Proceedings of the Fifth Iasted International Conference On Communications, Internet, and Information Technology, Ciit 2006. 13-18. |
0.469 |
|
Low-probability matches (unlikely to be authored by this person) |
2007 |
Borba GB, Gamba HR, Mayron LM, Marques O. Integrated global and object-based image retrieval using a multiple example query scheme Visapp 2007 - 2nd International Conference On Computer Vision Theory and Applications, Proceedings. 143-148. |
0.298 |
|
2011 |
Michel MCK, Helmick NP, Mayron LM. Cognitive cyber situational awareness using virtual worlds 2011 Ieee International Multi-Disciplinary Conference On Cognitive Methods in Situation Awareness and Decision Support, Cogsima 2011. 179-182. DOI: 10.1109/COGSIMA.2011.5753440 |
0.222 |
|
2013 |
Mayron LM, Hausawi Y, Bahr GS. Secure, usable biometric authentication systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8009: 195-204. DOI: 10.1007/978-3-642-39188-0-21 |
0.194 |
|
2012 |
Ford R, Mayron LM. All your base are belong to US Proceedings New Security Paradigms Workshop. 105-114. |
0.155 |
|
2010 |
Mayron LM. Secure multimedia communications Ieee Security and Privacy. 8: 76-79. DOI: 10.1109/MSP.2010.185 |
0.134 |
|
2013 |
Hausawi YM, Mayron LM. Towards usable and secure natural language processing systems Communications in Computer and Information Science. 373: 109-113. DOI: 10.1007/978-3-642-39473-7_23 |
0.133 |
|
2011 |
Morris TI, Mayron LM, Smith WB, Knepper MM, Ita R, Fox KL. A perceptually-relevant model-based cyber threat prediction method for enterprise mission assurance 2011 Ieee International Multi-Disciplinary Conference On Cognitive Methods in Situation Awareness and Decision Support, Cogsima 2011. 60-65. DOI: 10.1109/COGSIMA.2011.5753755 |
0.132 |
|
2011 |
Bahr GS, Mayron LM, Gacey HJ. Cyber risks to secure and private universal access Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6765: 433-442. DOI: 10.1007/978-3-642-21672-5_47 |
0.12 |
|
2015 |
Mayron LM. Behavioral biometrics for universal access and authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9175: 330-339. DOI: 10.1007/978-3-319-20678-3_32 |
0.111 |
|
2011 |
Bishop M, Carvalho M, Ford R, Mayron LM. Resilience is more than availability Proceedings New Security Paradigms Workshop. 95-103. DOI: 10.1145/2073276.2073286 |
0.105 |
|
2014 |
Fioravanti ME, Mayron LM. Measuring the effectiveness of output filtering against SQL injection attacks Proceedings of the 2014 Acm Southeast Regional Conference, Acm SE 2014. DOI: 10.1145/2638404.2638457 |
0.091 |
|
2015 |
Mayron LM. Biometric Authentication on Mobile Devices Ieee Security and Privacy. 13: 70-73. DOI: 10.1109/MSP.2015.67 |
0.067 |
|
2010 |
Mayron LM, Bahr GS, Balaban CD, Bell MG, Ford R, Fox KL, Henning RR, Smith WB. A hybrid cognitive-neurophysiological approach to resilient cyber security Proceedings - Ieee Military Communications Conference Milcom. 942-947. DOI: 10.1109/MILCOM.2010.5679585 |
0.036 |
|
Hide low-probability matches. |