Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Abstract. This paper presents viewpoint-dependent constraints that relate image features such as t-junctions and inflections to the pose of curved 3D objects. These constraints can...
To learn the preferential visual attention given by humans to specific image content, we present NUSEF- an eye fixation database compiled from a pool of 758 images and 75 subjects....
The paper discusses the issues concerning monitoring and diagnosis of a multi-robot system involving a team of mobile robots providing services in an environment which is partiall...
Human activity is extremely complex. Current technology allows us to handcraft real-time perception systems for a specific perceptual task. However, such an approach is inadequate...