default search action
Lawrence O'Gorman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i3]Lawrence O'Gorman:
Efficient Multi-Band Temporal Video Filter for Reducing Human-Robot Interaction. CoRR abs/2403.18096 (2024) - [i2]Bryan Bo Cao, Abhinav Sharma, Lawrence O'Gorman, Michael Coss, Shubham Jain:
A Lightweight Measure of Classification Difficulty from Application Dataset Characteristics. CoRR abs/2404.05981 (2024) - 2023
- [i1]Bryan Bo Cao, Lawrence O'Gorman, Michael Coss, Shubham Jain:
Data-Side Efficiencies for Lightweight Convolutional Neural Networks. CoRR abs/2308.13057 (2023) - 2020
- [c28]Lawrence O'Gorman, Xinyi Liu, Md Imran Sarker, Mariofanna G. Milanova:
Video Analytics Gait Trend Measurement for Fall Prevention and Health Monitoring. ICPR 2020: 489-496
2010 – 2019
- 2018
- [c27]Lawrence O'Gorman:
Temporal Filter Parameters for Motion Pattern Maps. ICPR 2018: 2612-2617 - [c26]Lawrence O'Gorman, Xiaoyang Wang:
Balancing Video Analytics Processing and Bandwidth for Edge-Cloud Networks. ICPR 2018: 2618-2623 - 2016
- [j36]Lawrence O'Gorman, Guang Yang:
Orthographic Perspective Mappings for Consistent Wide-Area Motion Feature Maps From Multiple Cameras. IEEE Trans. Image Process. 25(6): 2817-2832 (2016) - 2014
- [j35]Lawrence O'Gorman, Yafeng Yin, Tin Kam Ho:
Motion feature filtering for event detection in crowded scenes. Pattern Recognit. Lett. 44: 80-87 (2014) - [c25]Lawrence O'Gorman, Dorel Livescu, Guang Yang:
Creating a Unified, Wide-Area Activity Map for Multi-camera Networks. ICPR 2014: 4588-4593 - 2013
- [j34]Lawrence O'Gorman:
Putting a Kinder Face on Public Cameras. Computer 46(8): 79-81 (2013) - [j33]Yansong (Jennifer) Ren, Lawrence O'Gorman, Les J. Wu, Fangzhe Chang, Thomas L. Wood, John R. Zhang:
Authenticating Lossy Surveillance Video. IEEE Trans. Inf. Forensics Secur. 8(10): 1678-1687 (2013) - 2012
- [j32]Tin Kam Ho, Kim Matthews, Lawrence O'Gorman, Harald Steck:
Public Space Behavior Modeling With Video and Sensor Analytics. Bell Labs Tech. J. 16(4): 203-217 (2012) - [c24]Yansong (Jennifer) Ren, Lawrence O'Gorman:
Accuracy of a high-level, loss-tolerant video fingerprint for surveillance authentication. ICPR 2012: 1088-1091 - [c23]Lawrence O'Gorman:
Video privacy filters with tolerance to segmentation errors for video conferencing and surveillance. ICPR 2012: 1835-1838 - 2010
- [c22]Lawrence O'Gorman:
Latency in Speech Feature Analysis for Telepresence Event Coding. ICPR 2010: 4464-4467
2000 – 2009
- 2007
- [j31]Salil Prabhakar, Josef Kittler, Davide Maltoni, Lawrence O'Gorman, Tieniu Tan:
Introduction to the Special Issue on Biometrics: Progress and Directions. IEEE Trans. Pattern Anal. Mach. Intell. 29(4): 513-516 (2007) - 2006
- [c21]Lawrence O'Gorman, Lynne Shapiro Brotman, Michael J. Sammon:
How to Speak an Authentication Secret Securely from an Eavesdropper. Security Protocols Workshop 2006: 215-229 - [c20]Lawrence O'Gorman:
How to Speak an Authentication Secret Securely from an Eavesdropper. Security Protocols Workshop 2006: 230-236 - 2005
- [j30]Lawrence O'Gorman, Amit Bagga, Jon Louis Bentley:
Query-directed passwords. Comput. Secur. 24(7): 546-560 (2005) - [c19]Kiyoshi Sudo, Amit Bagga, Lawrence O'Gorman, Jon Louis Bentley:
Using Information Extraction for Quality Analysis in Human Authentication. HICSS 2005 - 2004
- [j29]Xiaoou Tang, Songde Ma, Lawrence O'Gorman, Massimo Tistarelli:
Guest Editorial Introduction to the Special Issue on Image- and Video-Based Biometrics. IEEE Trans. Circuits Syst. Video Technol. 14(1): 1-3 (2004) - [j28]Xiaoou Tang, Songde Ma, Lawrence O'Gorman, Massimo Tistarelli:
Guest Editorial: Introduction to the Special Issue on Image- and Video-Based Biometrics - Part II. IEEE Trans. Circuits Syst. Video Technol. 14(2): 146-148 (2004) - [c18]Lawrence O'Gorman, Amit Bagga, Jon Louis Bentley:
Call Center Customer Verification by Query-Directed Passwords. Financial Cryptography 2004: 54-67 - 2003
- [j27]Lawrence O'Gorman:
Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12): 2019-2020 (2003) - [j26]Lawrence O'Gorman:
Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12): 2021-2040 (2003) - [j25]Xiongwu Xia, Lawrence O'Gorman:
Innovations in fingerprint capture devices. Pattern Recognit. 36(2): 361-369 (2003) - [j24]Reza Derakhshani, Stephanie A. C. Schuckers, Larry A. Hornak, Lawrence O'Gorman:
Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners. Pattern Recognit. 36(2): 383-396 (2003)
1990 – 1999
- 1999
- [j23]Lawrence O'Gorman, Theo Pavlidis:
Auto ID technology: From barcodes to biometrics. IEEE Robotics Autom. Mag. 6(1): 4-6 (1999) - 1998
- [j22]Lawrence O'Gorman:
An overview of fingerprint verification technologies. Inf. Secur. Tech. Rep. 3(1): 21-32 (1998) - [j21]Lawrence O'Gorman, Irina Rabinovich:
Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography. IEEE Trans. Pattern Anal. Mach. Intell. 20(10): 1097-1102 (1998) - [j20]Alfred M. Bruckstein, Lawrence O'Gorman, Alon Orlitsky:
Design of Shapes for Precise Image Registration. IEEE Trans. Inf. Theory 44(7): 3156-3162 (1998) - 1996
- [j19]Jack Brassil, Abhijit K. Choudhury, David M. Kristol, Aleta M. Lapone, Steven H. Low, Nicholas F. Maxemchuk, Lawrence O'Gorman:
SEPTEMBER - secure electronic publishing trial. IEEE Commun. Mag. 34(5): 48-55 (1996) - [j18]Lawrence O'Gorman:
Subpixel Precision of Straight-Edged Shapes for Registration and Measurement. IEEE Trans. Pattern Anal. Mach. Intell. 18(7): 746-751 (1996) - [c17]Taku Tokuyasu, Lawrence O'Gorman:
Document Analysis versus Understanding: das'96 Working Group Report. DAS 1996: 512-514 - [c16]Lawrence O'Gorman, Irina Rabinovich:
Photo-image authentication by pattern recognition and cryptography. ICPR 1996: 949-953 - [c15]Jack Brassil, Lawrence O'Gorman:
Watermarking Document Images with Bounding Box Expansion. Information Hiding 1996: 227-235 - 1995
- [j17]Jack Brassil, Steven H. Low, Nicholas F. Maxemchuk, Lawrence O'Gorman:
Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE J. Sel. Areas Commun. 13(8): 1495-1504 (1995) - [c14]Lawrence O'Gorman:
Basic Techniques and Symbol-Level Recognition - An Overview. GREC 1995: 1-12 - [c13]Steven H. Low, Nicholas F. Maxemchuk, Jack Brassil, Lawrence O'Gorman:
Document Marking and Identification Using Both Line and Word Shifting. INFOCOM 1995: 853-860 - 1994
- [j16]Lawrence O'Gorman:
Binarization and Multithresholding of Document Images Using Connectivity. CVGIP Graph. Model. Image Process. 56(6): 494-506 (1994) - [c12]Jack Brassil, Steven H. Low, Nicholas F. Maxemchuk, Lawrence O'Gorman:
Marking text features of document images to deter illicit dissemination. ICPR (2) 1994: 315-319 - [c11]Lawrence O'Gorman:
Experimental comparisons of binarization and multi-thresholding methods on document images. ICPR (2) 1994: 395-398 - [c10]Jack Brassil, Steven H. Low, Nicholas F. Maxemchuk, Lawrence O'Gorman:
Electronic Marketing and Identification Techniques to Discourage Document Copying. INFOCOM 1994: 1278-1287 - 1993
- [j15]Melia M. Hoffman, Lawrence O'Gorman, Guy A. Story, James Q. Arnold, Nina H. MacDonald:
The RightPages Service: An Image-Based Electronic Library. J. Am. Soc. Inf. Sci. 44(8): 446-452 (1993) - [j14]Rangachar Kasturi, Lawrence O'Gorman:
Document image analysis techniques. Mach. Vis. Appl. 6(2-3): 67-68 (1993) - [j13]Lawrence O'Gorman:
The Document Spectrum for Page Layout Analysis. IEEE Trans. Pattern Anal. Mach. Intell. 15(11): 1162-1173 (1993) - 1992
- [j12]Lawrence O'Gorman, Rangachar Kasturi:
Document Image Analysis Systems - Guest Editors' Introduction to the Special Issue. Computer 25(7): 5-8 (1992) - [j11]Guy A. Story, Lawrence O'Gorman, David Fox, Louise Levy Schaper, H. V. Jagadish:
The RightPages Image-Based Electronic Library for Alerting and Browsing. Computer 25(9): 17-26 (1992) - [j10]Rangachar Kasturi, Lawrence O'Gorman:
Document image analysis techniques. Mach. Vis. Appl. 5(3): 141-142 (1992) - [j9]Rangachar Kasturi, Lawrence O'Gorman:
Document image analysis: A bibliography. Mach. Vis. Appl. 5(3): 231-243 (1992) - [c9]Lawrence O'Gorman:
Image and document processing techniques for the RightPages electronic library system. ICPR (2) 1992: 260-263 - 1990
- [j8]Lawrence O'Gorman:
k × k thinning. Comput. Vis. Graph. Image Process. 51(2): 195-215 (1990) - [c8]Lawrence O'Gorman, Alfred M. Bruckstein, Chinmoy B. Bose, Israel Amir:
Subpixel registration using a concentric ring fiducial. ICPR (2) 1990: 249-253 - [c7]Rangachar Kasturi, Senthil Siva, Lawrence O'Gorman:
Techniques for Line Drawing Interpretation: An Overview (Invited). MVA 1990: 151-160 - [c6]Lawrence O'Gorman, Alfred M. Bruckstein, Chinmoy B. Bose, Israel Amir:
A Comparison of Fiducial Shapes for Machine Vision Registration. MVA 1990: 253-256
1980 – 1989
- 1989
- [j7]H. V. Jagadish, Lawrence O'Gorman:
An Object Model for Image Recognition. Computer 22(12): 33-41 (1989) - [j6]Lawrence O'Gorman, Jeffrey V. Nickerson:
An approach to fingerprint filter design. Pattern Recognit. 22(1): 29-38 (1989) - 1988
- [j5]Lawrence O'Gorman:
A note on histogram equalization for optimal intensity range utilization. Comput. Vis. Graph. Image Process. 41(2): 229-232 (1988) - [c5]Lawrence O'Gorman:
An analysis of feature detectability from curvature estimation. CVPR 1988: 235-240 - [c4]Lawrence O'Gorman:
Primitives chain code [image analysis]. ICASSP 1988: 792-795 - [c3]Lawrence O'Gorman, Jeffrey V. Nickerson:
Matched filter design for fingerprint image enhancement. ICASSP 1988: 916-919 - [c2]Francky Catthoor, Lawrence O'Gorman, Rajeev Jain:
An ASIC architecture for contour line filtering. ICASSP 1988: 1056-1059 - 1987
- [j4]Lawrence O'Gorman, Arthur C. Sanderson:
A comparison of methods and computation for multi-resolution low- and band-pass transforms for image processing. Comput. Vis. Graph. Image Process. 37(3): 386-401 (1987) - 1986
- [j3]Lawrence O'Gorman, Arthur C. Sanderson:
Some Extensions of the Converging Squares Algorithm for Image Feature Analysis. IEEE Trans. Pattern Anal. Mach. Intell. 8(4): 520-524 (1986) - 1985
- [j2]Lawrence O'Gorman, Arthur C. Sanderson:
The Wedge Filter Technique for Convex Boundary Estimation. IEEE Trans. Pattern Anal. Mach. Intell. 7(3): 326-332 (1985) - 1984
- [j1]Lawrence O'Gorman, Arthur C. Sanderson:
The Converging Squares Algorithm: An Efficient Method for Locating Peaks in Multidimensions. IEEE Trans. Pattern Anal. Mach. Intell. 6(3): 280-288 (1984) - 1983
- [c1]Lawrence O'Gorman, Arthur C. Sanderson:
The converging squares algorithm: An efficient multidimensional peak picking method. ICASSP 1983: 112-115
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-16 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint