Traditionally, object recognition is performed based solely on the appearance of the object. However, relevant information also exists in the scene surrounding the object. As supp...
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Edge detection is one of the most studied problems in computer vision, yet it remains a very challenging task. It is difficult since often the decision for an edge cannot be made ...
Abstract. Agent-oriented modelling of software systems and agent-based simulation are commonly viewed as two separate fields with different concepts and techniques. We show that th...
Abstract: In this paper we present a framework for the fusion of radar and image information. In the case considered here we combine information from multiple closerange radars to ...