Abstract is missing.
- Real-time video analytics for petty crime detectionM. Nieto, L. Varona, Orti Senderos, Peter Leskovský, J. Garcia. 1-6 [doi]
- Bi-local region based iris segmentation framework for less- constrained visible wavelength imagesTong-Yuen Chai, Bok-Min Goi, Yong Haur Tay, K. S. Teng, I. Yeo. 1-6 [doi]
- Multi-object tracking with data association by a similarity identification modelMaría José Gómez-Silva, José María Armingol, Arturo de la Escalera. 1-6 [doi]
- Using RGB-D sensors for the detection of abandoned luggageM. Ajami, B. Lang. 1-5 [doi]
- Automated video surveillance for preventing suicide attemptsWassim Bouachir, Rita Noumeir. 1-6 [doi]
- Learning a similarity measure for striated toolmarks using convolutional neural networksManuel Keglevic, Robert Sablatnig. 1-6 [doi]
- Analysing depth contours for robust real-time stereo visionTariq Khan, Morteza Biglari-Abhari, Georgy L. Gimel'farb. 1-6 [doi]
- Attack detection in an autonomous entrance system using optical flowDirk Siegmund, B. Fu, Timotheos Samartzidis, Aidmar Wainakh, Arjan Kuijper, A. Braun. 1-6 [doi]
- Using keystroke and mouse dynamics for user identification in the online collaborative game league of legendsIsaac Da Silva Beserra, Lucas Camara, Márjory Cristiany Da Costa Abreu. 1-6 [doi]
- Classifying deformable and non-deformable video objectsWael F. Youssef, Siba Haidar, Philippe Joly. 1-6 [doi]
- Exploiting color cues to improve person re-identificationC. Chahla, Hichem Snoussi, Fadi Abdallah, F. Dornaika. 1-3 [doi]
- Violent behaviour detection using local trajectory responseK. Lloyd, Paul L. Rosin, A. David Marshall, Simon C. Moore. 1-6 [doi]
- A new brazilian hand-based behavioural biometrics database: data collection and analysisValmiro Ribeiro da Silva, Julliana C. G. De Araújo Silva, Márjory Da Costa-Abreu. 1-6 [doi]
- Detecting sensor level spoof attacks using joint encoding of temporal and spatial featuresJun Liu 0060, Ajay Kumar. 1-6 [doi]
- On-line normality modelling and anomaly event detection using spatio-temporal motion patternsJ. Garcia, L. Varona, P. Leskovsky, M. Nieto. 1-6 [doi]
- Automated detection of smuggled high-risk security threats using deep learningNicolas Jaccard, Thomas W. Rogers, Edward J. Morton, Lewis D. Griffin. 1-6 [doi]
- On using feature descriptors as visual words for object detection within X-ray baggage security screeningMikolaj E. Kundegorski, Samet Akcay, Michael Devereux, André Mouton, Toby P. Breckon. 1-6 [doi]
- Soft biometrics in low resolution and low quality CCTV videosTheodoros Semertzidis, Apostolos Axenopoulos, P. Karadimos, Petros Daras. 1-5 [doi]
- Designing a facial spoofing database for processed image attacksLuma Omar, Ioannis P. Ivrissimtzis. 1-6 [doi]
- Detecting acceleration for gait and crime scene analysisY. Sun, Jonathon S. Hare, Mark S. Nixon. 1-6 [doi]
- Person reidentification using omnidirectional camerasM. J. Silla, Antonio Albiol, Alberto Albiol, C. Sandoval. 1-6 [doi]
- Exploring the potential of facial skin regions for the provision of identity informationHamed Alsufyani, Sanaul Hoque, Farzin Deravi. 1-6 [doi]
- An efficient approach to enhance the performance of fingerprint recognitionFatemeh Alimardani, Nazanin Malekooty Rad, Reza Boostani. 1-6 [doi]
- Robust real-time traffic monitoring using corners motion statisticsAntonio Albiol, Alberto Albiol, José Manuel Mossi, Julia Silla. 1-6 [doi]
- Action recognition from videos using sparse trajectoriesAlexandros Doumanoglou, Nicholas Vretos, Petros Daras. 1-5 [doi]
- Disguised face identification using multi-modal features in a quaternionic formGeorge Apostolopoulos, Vasileios Tzitzilonis, Vassilios A. Kappatos, Evaggelos Dermatas. 1-6 [doi]