Skip to main content

Research Repository

Advanced Search

Outputs (59)

Evaluation Methodologies for Image Retrieval Systems (2002)
Conference Proceeding
Jermyn, I., Shaffrey, C., & Kingsbury, N. (2002). Evaluation Methodologies for Image Retrieval Systems. In Proceedings of ACIVS 2002 (Advanced Concepts for Intelligent Vision Systems), Ghent, Belgium, September 9-11, 2002

Evaluation plays an important role in the advancement of any field. ˆ In computer vision, unsupervised segmentation algorithms, although of great interest, often suffer from lack of a well-defined goal and/or explicit ground truth data, thus renderin... Read More about Evaluation Methodologies for Image Retrieval Systems.

Unsupervised Image Segmentation Via Markov Trees and Complex Wavelets (2002)
Conference Proceeding
Shaffrey, C., Kingsbury, N., & Jermyn, I. (2002). Unsupervised Image Segmentation Via Markov Trees and Complex Wavelets. In 2002 International Conference on Image Processing. 2002 ; proceedings (801-804). https://doi.org/10.1109/icip.2002.1039093

The goal in image segmentation is to label pixels in an image based on the properties of each pixel and its surrounding region. Recently content-based image retrieval (CBIR) has emerged as an application area in which retrieval is attempted by trying... Read More about Unsupervised Image Segmentation Via Markov Trees and Complex Wavelets.

Psychovisual Evaluation of Image Segmentation Algorithms (2002)
Conference Proceeding
Shaffrey, C., Jermyn, I., & Kingsbury, N. (2002). Psychovisual Evaluation of Image Segmentation Algorithms. In Proceedings of ACIVS 2002 (Advanced Concepts for Intelligent Vision Systems), Ghent, Belgium, September 9-11, 2002

Evaluation plays an important role in the advancement of any field. In computer vision, unsupervised segmentation algorithms, although of great interest, often suffer from lack of a well-defined goal and/or explicit ground truth data, thus rendering... Read More about Psychovisual Evaluation of Image Segmentation Algorithms.

Region Extraction from Multiple Images (2001)
Conference Proceeding
Ishikawa, H., & Jermyn, I. (2001). Region Extraction from Multiple Images. In Eighth IEEE International Conference on Computer Vision (ICCV 2001) : July 7-14, 2001, Vancouver, British Columbia, Canada ; proceedings (509-516). https://doi.org/10.1109/iccv.2001.937559

We present a method for region identification in multiple images. A set of regions in different images and the correspondences on their boundaries can be thought of as a boundary in the multi-dimensional space formed by the product of the individual... Read More about Region Extraction from Multiple Images.

Judging whether multiple silhouettes can come from the same object (2001)
Conference Proceeding
Jacobs, D., Belhumeur, P., & Jermyn, I. (2001). Judging whether multiple silhouettes can come from the same object. In C. Arcelli, L. P. Cordella, & G. Sanniti di Baja (Eds.), Visual form 2001 : 4th International Workshop on Visual Form, IWVF4, Capri, Italy, May 28-30, 2001 ; proceedings (532-541). https://doi.org/10.1007/3-540-45129-3_49

We consider the problem of recognizing an object from its silhouette. We focus on the case in which the camera translates, and rotates about a known axis parallel to the image, such as when a mobile robot explores an environment. In this case we pres... Read More about Judging whether multiple silhouettes can come from the same object.

Globally optimal regions and boundaries (1999)
Conference Proceeding
Jermyn, I., & Ishikawa, H. (1999). Globally optimal regions and boundaries. In The proceedings of seventh IEEE International Conference on Computer Vision, September 20-27, 1999, Kerkyra, Greece (904-910). https://doi.org/10.1109/iccv.1999.790318

We propose a new form of energy functional for the segmentation of regions in images, and an efficient method for finding its global optima. The energy can have contributions from both the region and its boundary, thus combining the best features of... Read More about Globally optimal regions and boundaries.

The design and analysis of graphical passwords (1999)
Conference Proceeding
Jermyn, I., Mayer, A., Monrose, F., Reiter, M., & Rubin, A. (1999). The design and analysis of graphical passwords. In Proceedings of the 8th USENIX Security Symposium (Security '99), Washington, D.C., USA, August 23-26, 1999

In this paper we propose and evaluate new graphical password schemes that exploit features of graphical input displays to achieve better security than text-based passwords. Graphical input devices enable the user to decouple the position of inputs fr... Read More about The design and analysis of graphical passwords.

Leaving the sandbox: Third party validation for Java applications (1998)
Conference Proceeding
Jermyn, I., Monrose, F., & Wyckoff, P. (1998). Leaving the sandbox: Third party validation for Java applications. In N. Debnath (Ed.), ISCA 13th International Conference on Computers and Their Applications (CATA-98) : March 25-27, 1998, Honolulu, Hawaii, USA ; proceedings (436-439)