138 views110 votes15 years 3 months ago ICANN 2010»
In previous work, we have developed a "Glance-Look" model, which has replicated a broad profile of data on the semantic Attentional Blink (AB) task and characterized how ...
133 views111 votes16 years 2 months ago ICSE 2008»
Because the knowledge required for the construction of a complex software system is often widely distributed among its members, programmers routinely engage in collaboration with ...
127 views146 votes15 years 9 months ago WAPCV 2007»
Visual attention regions are useful for many applications in the field of computer vision and robotics. Here, we introduce an application to simultaneous robot localization and ma...
182 views119 votes16 years 4 months ago CVPR 1997»
A multi-image focus of attention mechanism has been developed that can quickly distinguish raised objects like buildings from structured background clutter typical to many aerial ...
87 views106 votes15 years 7 months ago ICDAR 1999»
PixED (from Pixel to Electronic Document) is aimed at converting document images into structured electronic documents which can be read by a machine for information retrieval. The...
186 views130 votes15 years 2 months ago TROB 2008»
This paper is centered around landmark detection, tracking and matching for visual SLAM (Simultaneous Localization And Mapping) using a monocular vision system with active gaze con...
Abstract. "Cognitive computer vision is concerned with integration and control of vision systems using explicit but not necessarily symbolic models of context, situation and g...
In this paper we propose an attention-based vision system for the JAST interactive dialog robot. The robotic vision system incorporates three submodules: object recognition, gestu...
Human vision system actively seeks interesting regions in images to reduce the search effort in tasks, such as object detection and recognition. Similarly, prominent actions in v...
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...