Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
We present a tunable representation for tracking that simultaneously encodes appearance and geometry in a manner that enables the use of mean-shift iterations for tracking. The cl...
We present an activity recognition feature inspired by
human psychophysical performance. This feature is based
on the velocity history of tracked keypoints. We present a
generat...
In many tracking scenarios, the amplitude of target returns are stronger than those coming from false alarms. This information can be used to improve the multi-target state estimat...
Daniel Clark, Branko Ristic, Ba-Ngu Vo, Ba-Tuong V...
— This paper introduces a localization based on GPS and laser measurements for urban and non-urban outdoor environments. In this approach, the GPS pose is Kalman filtered using w...