Author of the publication

A Marked Point Process Model with Strong Prior Shape Information for the Extraction of Multiple, Arbitrarily-Shaped Objects.

, , , , and . SITIS, page 180-186. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Removing Shape-Preserving Transformations in Square-Root Elastic (SRE) Framework for Shape Analysis of Curves., , , and . EMMCVPR, volume 4679 of Lecture Notes in Computer Science, page 387-398. Springer, (2007)A multi-layer phase field model for extracting multiple near-circular objects., , and . ICPR, page 1427-1430. IEEE Computer Society, (2012)A Marked Point Process Model with Strong Prior Shape Information for the Extraction of Multiple, Arbitrarily-Shaped Objects., , , , and . SITIS, page 180-186. IEEE Computer Society, (2009)A Markov Random Field model for extracting near-circular shapes., , and . ICIP, page 1073-1076. IEEE, (2009)A Phase Field Method for Tomographic Reconstruction from Limited Data., , , and . BMVC, page 1-11. BMVA Press, (2012)Texture analysis: an adaptive probabilistic approach., , and . ICIP (2), page 1045-1048. IEEE, (2003)Phase Field Models and Higher-Order Active Contours., , and . ICCV, page 970-976. IEEE Computer Society, (2005)Judging Whether Multiple Silhouettes Can Come from the Same Object., , and . IWVF, volume 2059 of Lecture Notes in Computer Science, page 532-541. Springer, (2001)Globally Optimal Regions and Boundaries., and . ICCV, page 904-910. IEEE Computer Society, (1999)The Design and Analysis of Graphical Passwords., , , , and . USENIX Security Symposium, USENIX Association, (1999)