University of Colorado Colorado Springs

Results: 288



#Item
1Preamble Welcome to Business Information Systems 2003, the State of Colorado, and the University of Colorado in Colorado Springs (UCCS). I wish to thank all of you for bringing your curiosity and wealth of knowledge to s

Preamble Welcome to Business Information Systems 2003, the State of Colorado, and the University of Colorado in Colorado Springs (UCCS). I wish to thank all of you for bringing your curiosity and wealth of knowledge to s

Add to Reading List

Source URL: archive.kie.ue.poznan.pl

Language: English - Date: 2003-05-29 16:13:00
    2PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

    PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

    Add to Reading List

    Source URL: mjwilber.org

    - Date: 2015-09-25 13:01:34
      3An Efficient Minimal Solution for Multi-Camera Motion Jonathan Ventura Department of Computer Science University of Colorado Colorado Springs  Clemens Arth

      An Efficient Minimal Solution for Multi-Camera Motion Jonathan Ventura Department of Computer Science University of Colorado Colorado Springs Clemens Arth

      Add to Reading List

      Source URL: www.cv-foundation.org

      - Date: 2015-10-24 15:06:16
        4CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition Ethan M. Rudd and Terrance E. Boult University of Colorado at Colorado Springs Vision and Security Technology (VAST) Lab {erudd,tboult}@

        CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition Ethan M. Rudd and Terrance E. Boult University of Colorado at Colorado Springs Vision and Security Technology (VAST) Lab {erudd,tboult}@

        Add to Reading List

        Source URL: www.cv-foundation.org

        - Date: 2016-05-30 11:04:05
          5Towards Open Set Deep Networks Abhijit Bendale*, Terrance E. Boult University of Colorado at Colorado Springs {abendale,tboult}@vast.uccs.edu ∗  Abstract

          Towards Open Set Deep Networks Abhijit Bendale*, Terrance E. Boult University of Colorado at Colorado Springs {abendale,tboult}@vast.uccs.edu ∗ Abstract

          Add to Reading List

          Source URL: www.cv-foundation.org

          - Date: 2016-05-16 12:29:03
            6What do you do when you know that you don’t know? Abhijit Bendale*, Terrance E. Boult University of Colorado at Colorado Springs {abendale,tboult}@vast.uccs.edu ∗  Abstract

            What do you do when you know that you don’t know? Abhijit Bendale*, Terrance E. Boult University of Colorado at Colorado Springs {abendale,tboult}@vast.uccs.edu ∗ Abstract

            Add to Reading List

            Source URL: www.cv-foundation.org

            - Date: 2016-05-30 11:04:04
              7Adversarial Diversity and Hard Positive Generation Andras Rozsa, Ethan M. Rudd, and Terrance E. Boult∗ University of Colorado at Colorado Springs Vision and Security Technology (VAST) Lab {arozsa,erudd,tboult}@vast.ucc

              Adversarial Diversity and Hard Positive Generation Andras Rozsa, Ethan M. Rudd, and Terrance E. Boult∗ University of Colorado at Colorado Springs Vision and Security Technology (VAST) Lab {arozsa,erudd,tboult}@vast.ucc

              Add to Reading List

              Source URL: www.cv-foundation.org

              - Date: 2016-05-30 10:52:54
                8Reliable Posterior Probability Estimation for Streaming Face Recognition Abhijit Bendale University of Colorado at Colorado Springs Terrance Boult University of Colorado at Colorado Springs

                Reliable Posterior Probability Estimation for Streaming Face Recognition Abhijit Bendale University of Colorado at Colorado Springs Terrance Boult University of Colorado at Colorado Springs

                Add to Reading List

                Source URL: www.cv-foundation.org

                - Date: 2014-06-02 17:19:15
                  9PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses Ethan M. Rudd, Manuel Günther, and Terrance E. Boult University of Colorado at Colorado Springs Vision and Security Technology (VAST) Lab {erudd

                  PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses Ethan M. Rudd, Manuel Günther, and Terrance E. Boult University of Colorado at Colorado Springs Vision and Security Technology (VAST) Lab {erudd

                  Add to Reading List

                  Source URL: www.cv-foundation.org

                  - Date: 2016-05-30 11:04:05
                    10PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

                    PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

                    Add to Reading List

                    Source URL: www.vast.uccs.edu

                    - Date: 2012-07-06 12:46:22