default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2010
- Manu Bansal, Mohammad K. Jubran, Lisimachos P. Kondi:
Scalable H.264 Wireless Video Transmission over MIMO-OFDM Channels. ACIVS (2) 2010: 34-45 - Olivier Barnich, Sébastien Piérard, Marc Van Droogenbroeck:
A Virtual Curtain for the Detection of Humans and Access Control. ACIVS (2) 2010: 98-109 - Thibaut Beghin, James S. Cope, Paolo Remagnino, Sarah Barman:
Shape and Texture Based Plant Leaf Classification. ACIVS (2) 2010: 345-353 - Yannick Benezeth, Baptiste Hemery, Hélène Laurent, Bruno Emile, Christophe Rosenberger:
Evaluation of Human Detection Algorithms in Image Sequences. ACIVS (2) 2010: 121-130 - Amol Borkar, Monson Hayes, Mark T. Smith:
A Template Matching and Ellipse Modeling Approach to Detecting Lane Markers. ACIVS (2) 2010: 179-190 - Haibing Chen, Mei Yu, Feng Shao, Zongju Peng, Fucui Li, Gangyi Jiang:
A Novel Rate Control Method for H.264/AVC Based on Frame Complexity and Importance. ACIVS (2) 2010: 69-78 - Girija Chetty, Julian Goodwin, Monica Singh:
Digital Image Tamper Detection Based on Multimodal Fusion of Residue Features. ACIVS (2) 2010: 79-87 - Petr Chmelar, Ales Láník, Jozef Mlích:
SUNAR Surveillance Network Augmented by Retrieval. ACIVS (2) 2010: 155-166 - Alberto Corrales-García, Gerardo Fernández-Escribano, Francisco J. Quiles:
Mapping GOPS in an Improved DVC to H.264 Video Transcoder. ACIVS (2) 2010: 22-33 - Boguslaw Cyganek:
An Analysis of the Road Signs Classification Based on the Higher-Order Singular Value Decomposition of the Deformable Pattern Tensors. ACIVS (2) 2010: 191-202 - Katerine Díaz-Chito, Francesc J. Ferri, Wladimiro Díaz Villanueva:
Image Recognition through Incremental Discriminative Common Vectors. ACIVS (2) 2010: 304-311 - Fadi Dornaika, Karim Hammoudi:
Estimating 3D Polyhedral Building Models by Registering Aerial Images. ACIVS (2) 2010: 239-248 - Koen Douterloigne, Sidharta Gautama, Wilfried Philips:
Speeding Up Structure from Motion on Large Scenes Using Parallelizable Partitions. ACIVS (2) 2010: 13-21 - Bart Goossens, Hiêp Quang Luong, Jan Aelterman, Aleksandra Pizurica, Wilfried Philips:
A GPU-Accelerated Real-Time NLMeans Algorithm for Denoising Color Video Sequences. ACIVS (2) 2010: 46-57 - Xiaohua Gu, Weiguo Gong, Liping Yang, Weihong Li:
Regularized Kernel Locality Preserving Discriminant Analysis for Face Recognition. ACIVS (2) 2010: 284-291 - David Van Hamme, Peter Veelaert, Wilfried Philips, Kristof Teelen:
Fire Detection in Color Images Using Markov Random Fields. ACIVS (2) 2010: 88-97 - Xiaohua Huang, Guoying Zhao, Matti Pietikäinen, Wenming Zheng:
Dynamic Facial Expression Recognition Using Boosted Component-Based Spatiotemporal Features and Multi-classifier Fusion. ACIVS (2) 2010: 312-322 - Soo Kyoung Kim, Heggere S. Ranganath:
Content-Based Retrieval of Aurora Images Based on the Hierarchical Representation. ACIVS (2) 2010: 249-260 - Tae-Jung Kim, Bo-Seok Seo, Jae-Won Suh:
An Efficient Mode Decision Algorithm for Combined Scalable Video Coding. ACIVS (2) 2010: 58-68 - Mathias Kölsch:
An Appearance-Based Prior for Hand Tracking. ACIVS (2) 2010: 292-303 - Andrea Kovács, Tamás Szirányi:
New Saliency Point Detection and Evaluation Methods for Finding Structural Differences in Remote Sensing Images of Long Time-Span Samples. ACIVS (2) 2010: 272-283 - Pier Luigi Mazzeo, Paolo Spagnolo, Marco Leo, Tiziana D'Orazio:
Football Players Classification in a Multi-camera Environment. ACIVS (2) 2010: 143-154 - Ajmal S. Mian:
Face Recognition Using Contourlet Transform and Multidirectional Illumination from a Computer Screen. ACIVS (2) 2010: 332-344 - David Monnin, Etienne Bieber, Gwenaél Schmitt, Armin L. Schneider:
An Effective Rigidity Constraint for Improving RANSAC in Homography Estimation. ACIVS (2) 2010: 203-214 - Guillaume Noel, Karim Djouani, Yskandar Hamam:
Optimisation-Based Image Grid Smoothing for SST Images. ACIVS (2) 2010: 227-238 - Nikolay N. Ponomarenko, Vladimir V. Lukin, Mikhail Zriakhov, Arto Kaarna:
Improved Grouping and Noise Cancellation for Automatic Lossy Compression of AVIRIS Images. ACIVS (2) 2010: 261-271 - Caifeng Shan:
Gender Classification on Real-Life Faces. ACIVS (2) 2010: 323-331 - Prarthana Shrestha, Hans Weda, Mauro Barbieri, Peter H. N. de With:
Video Quality Analysis for Concert Video Mashup Generation. ACIVS (2) 2010: 1-12 - Ákos Utasi, Andrea Kovács:
Recognizing Human Actions by Using Spatio-temporal Motion Descriptors. ACIVS (2) 2010: 366-375 - Ali Wali, Najib Ben Aoun, Hichem Karray, Chokri Ben Amar, Adel M. Alimi:
A New System for Event Detection from Video Surveillance Sequences. ACIVS (2) 2010: 110-120
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-04 05:39 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint