Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
Tracking humans in an indoor environment is an essential part of surveillance systems. Vision based and microphone array based trackers have been extensively researched in the pas...
Shankar T. Shivappa, Mohan M. Trivedi, Bhaskar D. ...
A method is proposed to encode multiple regions of interest in the JPEG2000 image-coding framework. The algorithm is based on the rearrangement of packets in the code-stream to pl...
In some retrieval situations, a system must search across multiple collections. This task, referred to as federated search, occurs for example when searching a distributed index o...
We describe a system for guiding blind and visually impaired wheelchair users along a clear path that uses computer vision to sense the presence of obstacles or other terrain feat...
Volodymyr Ivanchenko, James Coughlan, William Gerr...