Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Mugshot

Known as: Mugshot (software), Mugshot.org 
Mugshot was a social networking website created by Red Hat. Unlike most other social networking websites (which are concerned with advertising), it… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Reconstructing 3D face models from 2D face images is usually done by using a single reference 3D face model or some gender… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
National Key Laboratory of Fundamental Science on Synthetic Vision,College of Computer Science, Sichuan University, Chengdu… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2015
2015
Mugshots taken by the Indiana Department of Corrections (IDOC) were analyzed for face recognition image quality. The mugshots… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 2
  • figure 5
Is this relevant?
2014
2014
Facial composites are widely used by law enforcement agencies to assist in the identification and apprehension of suspects… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Mugshot is a system that captures every event in an executing JavaScript program, allowing developers to deterministically replay… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
When eyewitnesses examine a set of mugshots, the photos can be presented either individually or in groups. The present experiment… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Mug shot photography has been used to identify criminals by the police for more than a century. However, the common scenario of… Expand
  • figure 1
  • table I
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
2006
2006
Tolerance to pose variations is one of the key remaining problems in face recognition. It is of great interest in airport… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2005
2005
Face recognition is employed in several systems and computer based applications besides security applications. A broad variety of… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2001
2001
Face recognition has established itself as an important sub-branch of pattern recognition within the field of computer science… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?