Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Mugshot

Known as: Mugshot (software), Mugshot.org 
Mugshot was a social networking website created by Red Hat. Unlike most other social networking websites (which are concerned with advertising), it… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Reconstructing 3D face models from 2D face images is usually done by using a single reference 3D face model or some gender… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2016
2016
National Key Laboratory of Fundamental Science on Synthetic Vision,College of Computer Science, Sichuan University, Chengdu… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
2015
2015
With the deployment of automatic face recognition systems for many large-scale applications, it is crucial that we gain a… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Highly Cited
2015
Highly Cited
2015
Due to the prevalence of social media websites, one challenge facing computer vision researchers is to devise methods to process… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2014
Highly Cited
2014
Facial composites are widely used by law enforcement agencies to assist in the identification and apprehension of suspects… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 5
2013
2013
Fingerprint based identification is becoming increasingly useful and cost effective now a days to tackle growing trend of… Expand
  • figure 1
  • table I
  • table II
  • table III
  • figure 2
Highly Cited
2010
Highly Cited
2010
Mugshot is a system that captures every event in an executing JavaScript program, allowing developers to deterministically replay… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2008
Highly Cited
2008
Mug shot photography has been used to identify criminals by the police for more than a century. However, the common scenario of… Expand
  • figure 1
  • table I
  • figure 2
  • figure 4
  • figure 3
Highly Cited
1993
Highly Cited
1993
This document describes the NIST fingerprint database, NIST Special Database 14. The database is being distributed for use in the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1992
Highly Cited
1992
We describe a computer program which understands a greyscale image of a face well enough to locate individual face features such… Expand