This year, the program consisted of 13 oral sessions, one poster session, ten special tracks, and six keynote presentations. ...
اقرأ المزيدThis year, the program consisted of 13 oral sessions, one poster session, ten special tracks, and six keynote presentations. ...
اقرأ المزيدThe two volume set LNCS 5358 and LNCS 5359 constitutes the refereed proceedings of the 4th International Symposium on Visual ...
اقرأ المزيدThe two volume set LNCS 5358 and LNCS 5359 constitutes the refereed proceedings of the 4th International Symposium on Visual ...
اقرأ المزيدThe visual information systems paradigm continues to evolve, and the unrelenting exponential growth in the amount of digital ...
اقرأ المزيدThe visual information systems paradigm continues to evolve, and the unrelenting exponential growth in the amount of digital ...
اقرأ المزيدThe present book provides an account of the latest work on a variety of aspects related to affect and emotion in human-technology ...
اقرأ المزيدThe book is organized in topical sections on affective facial expression and recognition, affective body expression and recognition, ...
اقرأ المزيدThe book is organized in topical sections on affective facial expression and recognition, affective body expression and recognition, ...
اقرأ المزيدThe book covered by these accepted papers include feature representation, 3D face, robust recognition under pose and illumination ...
اقرأ المزيدThe book covered by these accepted papers include feature representation, 3D face, robust recognition under pose and illumination ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th International Conference on Articulated Motion and Deformable Objects, ...
اقرأ المزيدThe subject of the conference was ongoing research in articulated motionon a sequence of images and sophisticated models ...
اقرأ المزيدConstitutes the refereed proceedings of the Third TC3 IAPR Workshop on Artificial Neural Networks in Pattern Recognition, ...
اقرأ المزيدFor the past decade, there has been success in using conventional map-based strategies in identification and cloning of quantitative ...
اقرأ المزيدBiometric authentication refers to identifying an individual based on his or her distinguishing physiological and/or behavioral ...
اقرأ المزيدThe use of computers to recognize humans from physical and behavioral traits dates back to the digital computer evolution ...
اقرأ المزيدBiometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological ...
اقرأ المزيدThis volume constitutes the post-conference proceedings of the First European Workshop on Biometrics and Identity Management, ...
اقرأ المزيدThis book presents the most recent achievements in some fascinating and rapidly developing fields within Computer Science. ...
اقرأ المزيد