Prabir Bhattacharya

According to our database1, Prabir Bhattacharya authored at least 211 papers between 1984 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2002, "For contributions to geometrical and mathematical aspects of image understanding and processing.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Improving Prediction Accuracy for Logistic Regression on Imbalanced Datasets.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Fast Training of a Convolutional Neural Network for Brain MRI Classification.
Proceedings of the 2019 ACM Southeast Conference, 2019

2018
Nuclei Segmentation for Quantification of Brain Tumors in Digital Pathology Images.
IJSSCI, 2018

Secure Mobile Software Development with Vulnerability Detectors in Static Code Analysis.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Detectors for Intent ICC Security Vulnerability with Android IDE.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Security Threat Analysis of SDN Switch Flow Table.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
An Innovative Model for Detecting Brain Tumors and Glioblastoma Multiforme Disease Patterns.
IJSSCI, 2017

Labware for Secure Mobile Software Development (SMSD) Education.
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017

Learning database security with hands-on mobile labs.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

Improving the Prediction Accuracy of Decision Tree Mining with Data Preprocessing.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

A novel brain image processing method for the application of detecting the GBM disease patterns in anatomic sections of T1-weighted 3D magnetic resonance imaging.
Proceedings of the 16th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2017

2016
A hybrid analysis for mobile security threat detection.
Proceedings of the IEEE 7th Annual Ubiquitous Computing, 2016

Mechanism Design for Replica Placement in Peer-Assisted Content Delivery Networks with Heterogeneous Behavior Models.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Developing a retrieval based diagnostic aid for automated melanoma recognition of dermoscopic images.
Proceedings of the 2016 IEEE Applied Imagery Pattern Recognition Workshop, 2016

Segmentation of nuclei in digital pathology images.
Proceedings of the 15th IEEE International Conference on Cognitive Informatics & Cognitive Computing , 2016

2015
A method for determining the number of features in the kernel space required for preserving classifiability.
Signal, Image and Video Processing, 2015

A novel hybrid approach utilizing principal component regression and random forest regression to bridge the period of GPS outages.
Neurocomputing, 2015

A hybrid approach for mobile security threat analysis.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Web Service-Enabled Spam Filtering with Naïve Bayes Classification.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

2014
A method for preserving the classifiability of digital images after performing a wavelet-based compression.
Signal, Image and Video Processing, 2014

An evolutionary framework for detecting protein conformation defects.
Inf. Sci., 2014

Learning Mobile Security with Labware.
IEEE Security & Privacy, 2014

A novel hybrid fusion algorithm to bridge the period of GPS outages using low-cost INS.
Expert Syst. Appl., 2014

Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs.
Proceedings of the Innovation and Technology in Computer Science Education Conference 2014, 2014

Diverse virtual replicas for improving intrusion tolerance in cloud.
Proceedings of the Cyber and Information Security Research Conference, 2014

Outsourceable two-party privacy-preserving biometric authentication.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Game-theoretic surveillance over arbitrary floor plan using a video camera network.
Signal, Image and Video Processing, 2013

Dempster Shafer neural network algorithm for land vehicle navigation application.
Inf. Sci., 2013

A low-cost INS/GPS integration methodology based on random forest regression.
Expert Syst. Appl., 2013

Detection of protein conformation defects from fluorescence microscopy images.
Eng. Appl. of AI, 2013

Enhance computer networks learning with hands-on mobile device based labware (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Learning mobile security with android security labware.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Mobile device based authentic learning for computer network and security.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

Authentic learning of mobile security with case studies.
Proceedings of the IEEE Frontiers in Education Conference, 2013

2012
Iris segmentation using game theory.
Signal, Image and Video Processing, 2012

An Enhanced MEMS Error Modeling Approach Based on Nu-Support Vector Regression.
Sensors, 2012

Mechanism Design Based Secure Data Object Replication.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Work in progress: Real world relevant security labware for mobile threat analysis and protection experience.
Proceedings of the IEEE Frontiers in Education Conference, 2012

2011
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.
IEEE Trans. Dependable Sec. Comput., 2011

A criterion for measuring the separability of clusters and its applications to principal component analysis.
Signal, Image and Video Processing, 2011

Iris recognition using shape-guided approach and game theory.
Pattern Anal. Appl., 2011

Classifying Facial Expressions Using Level Set Method Based Lip Contour Detection and Multi-Class Support Vector Machines.
IJPRAI, 2011

Towards nonideal iris recognition based on level set method, genetic algorithms and adaptive asymmetrical SVMs.
Eng. Appl. of AI, 2011

Selection of optimal texture descriptors for retrieving ultrasound medical images.
Proceedings of the 8th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2011

Live Programming Learning Objects on Cloud.
Proceedings of the ICALT 2011, 2011

A Cloud-based Cyberlearning Environment for Introductory Computing Programming Education.
Proceedings of the ICALT 2011, 2011

A Collaborative Interactive Cyber-learning Platform for Anywhere Anytime Java Programming Learning.
Proceedings of the ICALT 2011, 2011

Classification of Ultrasound Medical Images Using Distance Based Feature Selection and Fuzzy-SVM.
Proceedings of the Pattern Recognition and Image Analysis - 5th Iberian Conference, 2011

Local relative GLRLM-based texture feature extraction for classifying ultrasound medical images.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

A game-theoretic design for collaborative tracking in a video camera network.
Proceedings of the 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2011

2010
Video watermarking using wavelet transform and tensor algebra.
Signal, Image and Video Processing, 2010

A driver fatigue recognition model based on information fusion and dynamic Bayesian network.
Inf. Sci., 2010

Improvement of Iris Recognition Performance Using Region-Based Active Contours, Genetic Algorithms and SVMs.
IJPRAI, 2010

An integrated and interactive decision support system for automated melanoma recognition of dermoscopic images.
Comp. Med. Imag. and Graph., 2010

A new method of information decision-making based on D-S evidence theory.
Proceedings of the IEEE International Conference on Systems, 2010

Learning Human Action Sequence Style from Video for Transfer to 3D Game Characters.
Proceedings of the Motion in Games - Third International Conference, 2010

Advances in Detecting Parkinson's Disease.
Proceedings of the Medical Biometrics, Second International Conference, 2010

BAUT: A Bayesian Driven Tutoring System.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Retrieval and classification of ultrasound images of ovarian cysts combining texture features and histogram moments.
Proceedings of the 2010 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2010

Segmentation of Unideal Iris Images Using Game Theory.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

On Supporting Identification in a Hand-Based Biometric Framework.
Proceedings of the Image and Signal Processing, 4th International Conference, 2010

Recognition of unideal iris images using region-based active contour model and game theory.
Proceedings of the International Conference on Image Processing, 2010

Unideal Iris Segmentation Using Region-Based Active Contour Model.
Proceedings of the Image Analysis and Recognition, 7th International Conference, 2010

Multimodality Image Alignment Using Information-Theoretic Approach.
Proceedings of the Image Analysis and Recognition, 7th International Conference, 2010

Automated synthesis of feature functions for pattern detection.
Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering, 2010

Content-Based Retrieval and Classification of Ultrasound Medical Images of Ovarian Cysts.
Proceedings of the Artificial Neural Networks in Pattern Recognition, 2010

2009
Watermarking 3D models using spectral mesh compression.
Signal, Image and Video Processing, 2009

A unified image retrieval framework on local visual and semantic concept-based feature spaces.
J. Visual Communication and Image Representation, 2009

An Intrusion Detection Game Theoretical Model.
Information Security Journal: A Global Perspective, 2009

Invariant Pattern Recognition Using Ridgelet Packets and the Fourier Transform.
IJWMIP, 2009

lambda_SAOP: A Security AOP Calculus.
Comput. J., 2009

An Efficient Image Pattern Recognition System Using an Evolutionary Search Strategy.
Proceedings of the IEEE International Conference on Systems, 2009

Iris Recognition in Nonideal Situations.
Proceedings of the Information Security, 12th International Conference, 2009

Nonideal Iris Recognition Using Level Set Approach and Coalitional Game Theory.
Proceedings of the Computer Vision Systems, 2009

Secure biometric system for accessing home appliances via Internet.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Level Set Approaches and Adaptive Asymmetrical SVMs Applied for Nonideal Iris Recognition.
Proceedings of the Image Analysis and Recognition, 6th International Conference, 2009

An evolutionary approach to feature function generation in application to biomedical image patterns.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Image retrieval with automatic query expansion based on local analysis in a semantical concept feature space.
Proceedings of the 8th ACM International Conference on Image and Video Retrieval, 2009

Secure and simplified access to home appliances using Iris recognition.
Proceedings of the 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, 2009

The dataflow pointcut: a formal and practical framework.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009

2008
Mobile Security: Game Theory.
Encyclopedia of Wireless and Mobile Communications, 2008

New AspectJ Pointcuts for Integer Overflow and Underflow Detection.
Information Security Journal: A Global Perspective, 2008

Optimal Features Subset Selection and Classification for Iris Recognition.
EURASIP J. Image and Video Processing, 2008

Multimodality Inferring of Human Cognitive States Based on Integration of Neuro-Fuzzy Network and Information Fusion Techniques.
EURASIP J. Adv. Sig. Proc., 2008

A game-theoretic intrusion detection model for mobile ad hoc networks.
Computer Communications, 2008

Game theoretic models for detecting network intrusions.
Computer Communications, 2008

Medical image retrieval with probabilistic multi-class support vector machine classifiers and adaptive similarity fusion.
Comp. Med. Imag. and Graph., 2008

A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Game Theoretic Approach to Optimize the Performance of Host-Based IDS.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Screening Diabetic Retinopathy Through Color Retinal Images.
Proceedings of the Medical Biometrics, First International Conference, 2008

Optimal Features Selection and Classification for Iris Recognition.
Proceedings of the Image Analysis, 2008

Iris Recognition based on Genetic Algorithms and Multi-Class Gaussian Mixture Model.
Proceedings of the Image Analysis, 2008

Adaptive asymmetrical SVM and genetic algorithms based iris recognition.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Dark line detection with line width extraction.
Proceedings of the International Conference on Image Processing, 2008

Optimal Features Subset Selection Using Genetic Algorithms for Iris Recognition.
Proceedings of the Image Analysis and Recognition, 5th International Conference, 2008

Robust 3D Watermarking Technique Using Eigendecomposition and Nonnegative Matrix Factorization.
Proceedings of the Image Analysis and Recognition, 5th International Conference, 2008

A multiple expert-based melanoma recognition system for dermoscopic images of pigmented skin lesions.
Proceedings of the 8th IEEE International Conference on Bioinformatics and Bioengineering, 2008

Improving Features Subset Selection Using Genetic Algorithms for Iris Recognition.
Proceedings of the Artificial Neural Networks in Pattern Recognition, Third IAPR Workshop, 2008

2007
A Framework for Medical Image Retrieval Using Machine Learning and Statistical Similarity Matching Techniques With Relevance Feedback.
IEEE Trans. Information Technology in Biomedicine, 2007

Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms.
J. Electronic Imaging, 2007

Stereo Matching Using the Discrete Wavelet Transform.
IJWMIP, 2007

An Efficient and Truthful Leader IDS Election Mechanism for MANET.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

Palm Vein Extraction and Matching for Personal Authentication.
Proceedings of the Advances in Visual Information Systems, 9th International Conference, 2007

Cumulative Global Distance for Dimension Reduction in Handwritten Digits Database.
Proceedings of the Advances in Visual Information Systems, 9th International Conference, 2007

Classifying facial expressions using point-based analytic face model and Support Vector Machines.
Proceedings of the IEEE International Conference on Systems, 2007

Application of Multi-objective Genetic Algorithm and asymmetrical Support Vector Machine to improve the reliability of an iris recognition system.
Proceedings of the IEEE International Conference on Systems, 2007

An AOP Extended Lambda-Calculus.
Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 2007

Cross-Modal Interaction and Integration with Relevance Feedback for Medical Image Retrieval.
Proceedings of the Advances in Multimedia Modeling, 2007

Classification of Facial Expressions Using K-Nearest Neighbor Classifier.
Proceedings of the Computer Vision/Computer Graphics Collaboration Techniques, 2007

Palm Vein Extraction and Matching for Personal Identification and Liveness Detection.
Proceedings of the 2007 International Conference on Image Processing, 2007

Screening Prolifetive Diabetic Retinopathy Through Color Retinal Images.
Proceedings of the 2007 International Conference on Image Processing, 2007

Support Vector Machines Applied to Automated Categorization of Facial Expressions.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

Iris Recognition Based on Zigzag Collarette Region and Asymmetrical Support Vector Machines.
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007

MPEG Video Watermarking Using Tensor Singular Value Decomposition.
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007

Automated Lip Contour Detection Using the Level Set Segmentation Method.
Proceedings of the 14th International Conference on Image Analysis and Processing (ICIAP 2007), 2007

Collarette Area Localization and Asymmetrical Support Vector Machines for Efficient Iris Recognition.
Proceedings of the 14th International Conference on Image Analysis and Processing (ICIAP 2007), 2007

A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

Spectral graph-theoretic approach to 3D mesh watermarking.
Proceedings of the Graphics Interface 2007 Conference, May 28-30, 2007, Montreal, Canada, 2007

Testing Intrusion Detection Systems in MANET: A Comprehensive Study.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

Multi-Modal Interactive Approach to ImageCLEF 2007 Photographic and Medical Retrieval Tasks by CINDI.
Proceedings of the Working Notes for CLEF 2007 Workshop co-located with the 11th European Conference on Digital Libraries (ECDL 2007), 2007

An Interactive and Dynamic Fusion-Based Image Retrieval Approach by CINDI.
Proceedings of the Advances in Multilingual and Multimodal Information Retrieval, 2007

2006
Cancer Classification Using Case-Based Reasoning Classifier.
Proceedings of the IEEE International Conference on Systems, 2006

A Multiscale Approach to Retinal Vessel Segmentation Using Gabor Filters and Scale Multiplication.
Proceedings of the IEEE International Conference on Systems, 2006

An Iris Recognition Method Based On Zigzag Collarette Area and Asymmetrical Support Vector Machines.
Proceedings of the IEEE International Conference on Systems, 2006

Automated Retinal Vessel Segmentation Using Gabor Filters and Scale Multiplication.
Proceedings of the 2006 International Conference on Image Processing, 2006

Visual Keyword-based Image Retrieval using Latent Semantic Indexing, Correlation-enhanced Similarity Matching and Query Expansion in Inverted Index.
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006

A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Function Dot Product Kernels for Support Vector Machine.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Invariant Texture Classification Using Ridgelet Packets.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Image Representation and Retrieval Using Support Vector Machine and Fuzzy C-means Clustering Based Semantical Spaces.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Iris Recognition with Support Vector Machines.
Proceedings of the Advances in Biometrics, International Conference, 2006

A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Feature Level Fusion in Similarity Matching to Content-Based Image Retrieval.
Proceedings of the 9th International Conference on Information Fusion, 2006

CINDI at ImageCLEF 2006: Image Retrieval & Annotation Tasks for the General Photographic and Medical Image Collections.
Proceedings of the Working Notes for CLEF 2006 Workshop co-located with the 10th European Conference on Digital Libraries (ECDL 2006), 2006

Image Retrieval-Based Decision Support System for Dermatoscopic Images.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

2005
A driver fatigue recognition model using fusion of multiple features.
Proceedings of the IEEE International Conference on Systems, 2005

A new approach to appearance-based face recognition.
Proceedings of the IEEE International Conference on Systems, 2005

Dynamic Feature Selection and Coarse-To-Fine Search for Content-Based Image Retrieval.
Proceedings of the Pattern Recognition in Information Systems, 2005

Appearance-based Face Recognition using Aggregated 2D Gabor Features.
Proceedings of the Pattern Recognition in Information Systems, 2005

Probabilistic Similarity Measures in Image Databases with SVM Based Categorization and Relevance Feedback.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005

An Integration of Biometrics and Mobile Computing for Personal Identification.
Proceedings of the Pattern Recognition and Image Analysis, 2005

Similarity Searching in Image Retrieval with Statistical Distance Measures and Supervised Learning.
Proceedings of the Pattern Recognition and Data Mining, 2005

Supervised Machine Learning based Medical Image Annotation and Retrieval.
Proceedings of the Working Notes for CLEF 2005 Workshop co-located with the 9th European Conference on Digital Libraries (ECDL 2005), 2005

Supervised Machine Learning Based Medical Image Annotation and Retrieval in ImageCLEFmed 2005.
Proceedings of the Accessing Multilingual Information Repositories, 2005

On Aggregated 2D Gabor Features for Appearance-based Face Recognition.
Proceedings of The 2005 International Conference on Imaging Science, 2005

2003
Remote access and networked appliance control using biometrics features.
IEEE Trans. Consumer Electronics, 2003

An encryption scheme for limited k-time access to digital media.
IEEE Trans. Consumer Electronics, 2003

Convexity properties of space curves.
Pattern Recognition Letters, 2003

Geometric and algebraic properties of point-to-line mappings.
Pattern Recognition, 2003

2002
Point-to-line mappings as Hough transforms.
Pattern Recognition Letters, 2002

k-time encryption for k-time licensing.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

2001
Content-Based Indexing of Volumetric Images Using Principal Component Analysis.
IJPRAI, 2001

Secure Network Communication Using Biometrics.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001

2000
On the Dempster-Shafer evidence theory and non-hierarchical aggregation of belief structures.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2000

A wavelet-based coarse-to-fine image matching scheme in a parallel virtual machine environment.
IEEE Trans. Image Processing, 2000

A fuzzy-logic-based approach to project selection.
IEEE Trans. Engineering Management, 2000

a-Convexity.
Pattern Recognition Letters, 2000

Hough-transform detection of lines in 3-D space.
Pattern Recognition Letters, 2000

Polynomial morphological approach in pattern recognition.
Proceedings of the Visual Information Processing IX, Orlando, FL, USA, April 24, 2000, 2000

Dynamic Shape Retrieval by Hierarchical Curve Matching, Snakes and Data Mining.
Proceedings of the 15th International Conference on Pattern Recognition, 2000

Uncalibrated Stereo Matching Using DWT.
Proceedings of the 15th International Conference on Pattern Recognition, 2000

Point-to-Line Mappings and Hough Transforms.
Proceedings of the Digital and Image Geometry, 2000

1999
Gray Image Skeletonization with Hollow Preprocessing Using Distance Transformation.
IJPRAI, 1999

Image Understanding with Connected Component Histograms.
Proceedings of the PICS 1999: Proceedings of the Conference on Image Processing, 1999

1998
"Convexity" of sets of lines.
Pattern Recognition Letters, 1998

Matching 2D Polygonal Arcs by Using a Subgroup of the Unit Quaternions.
Computer Vision and Image Understanding, 1998

Three-dimensional skeletonization using distance transform.
Proceedings of the Visual Information Processing VII, Orlando, FL, USA, April 13, 1998, 1998

An Algorithm for Finding Parameter Dependent: Connected Components of Gray Images.
Proceedings of the PICS 1998: IS&T's 1998 Image Processing, 1998

Real-time object recognition: hierarchical image matching in a parallel virtual machine environment.
Proceedings of the Fourteenth International Conference on Pattern Recognition, 1998

Object and motion recognition using the plane plus parallax displacement of conics.
Proceedings of the Fourteenth International Conference on Pattern Recognition, 1998

1997
Matching of 3D Polygonal Arcs.
IEEE Trans. Pattern Anal. Mach. Intell., 1997

Invariants of Families of Coplanar Conics and Their Applications to Object Recognition.
Journal of Mathematical Imaging and Vision, 1997

A Width-Independent Sequential Thinning Algorithm.
IJPRAI, 1997

Digital Connectivity and Extended Well-Composed Sets for Gray Images.
Computer Vision and Image Understanding, 1997

Skeletonization of gray-scale images by gray weighted distance transform.
Proceedings of the Visual Information Processing VI, Orlando, FL, USA, April 21, 1997, 1997

Hierarchical stereo correspondence using features of gray connected components.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

1996
On parameter-dependent connected components of gray images.
Pattern Recognition, 1996

Connected component labeling for binary images on a reconfigurable mesh architecture.
Journal of Systems Architecture, 1996

A Parallel Algorithm to Compute the Supremum of Max-Min Powers.
Computers and Artificial Intelligence, 1996

Matching of 3-D curves.
Proceedings of the 1996 IEEE International Conference on Robotics and Automation, 1996

Invariants of families of coplanar conics and their applications to object recognition.
Proceedings of the 13th International Conference on Pattern Recognition, 1996

1995
A new 3-D transform using a ternary product.
IEEE Trans. Signal Processing, 1995

Iterative histogram modification of gray images.
IEEE Trans. Systems, Man, and Cybernetics, 1995

Polygonal ribbons in two and three dimensions.
Pattern Recognition, 1995

A theory of parameter-dependent connected components of gray images and segmentation.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

1994
Polygons in Three Dimensions.
J. Visual Communication and Image Representation, 1994

1993
An algebraic approach for morphological operations on 2D and 3D images.
Pattern Recognition, 1993

An O(log m) Parallel Algorithm for the Minimum Spanning Tree Problem.
Inf. Process. Lett., 1993

1992
A 3D object recognition system using voxel representation.
Pattern Recognition Letters, 1992

A template polynomial approach for image processing and visual recognition.
Pattern Recognition, 1992

A parallel cost-optimal algorithm to compute the supremum of max-min powers.
Parallel Computing, 1992

Determining holes and connectivity in binary images.
Computers & Graphics, 1992

A Parallel Algorithm for the Minimum Spanning Tree on an SIMD Machine.
Proceedings of the ACM 20th Annual Conference on Computer Science, 1992

1991
An algebraic method for processing colored images.
Pattern Recognition Letters, 1991

An algorithm to compute the supremum of max-min powers and a property of fuzzy graphs.
Pattern Recognition Letters, 1991

3-D vision algorithms based on polynomial representation(abstract and references only).
Proceedings of the 19th annual conference on Computer Science, 1991

1990
Binary image processing by polynomial approach.
Pattern Recognition Letters, 1990

Association schemes on triples and a ternary algebra.
J. Comb. Theory, Ser. A, 1990

Contour codes of isothetic polygons.
Computer Vision, Graphics, and Image Processing, 1990

Software Development: Image Processing by Template Polynomials.
Proceedings of the ACM 18th Annual Computer Science Conference on Cooperation, 1990

1988
An algebraic environment to process fuzzy images.
Pattern Recognition Letters, 1988

1987
Some remarks on fuzzy graphs.
Pattern Recognition Letters, 1987

Fuzzy groups: Some group theoretic analogs. II.
Inf. Sci., 1987

1986
Fuzzy groups: Some group-theoretic analogs.
Inf. Sci., 1986

Fuzzy subgroups: Some characterizations. II.
Inf. Sci., 1986

1985
Fuzzy relations and fuzzy groups.
Inf. Sci., 1985

1984
Fuzzy normal subgroups and fuzzy cosets.
Inf. Sci., 1984

On a class of Abelian codes.
Inf. Sci., 1984


  Loading...