This paper presents a novel technique for camera tampering detection. It is implemented in real-time and was developed for use in surveillance and security applications. This meth...
Evan Ribnick, Stefan Atev, Osama Masoud, Nikolaos ...
We describe a method for selecting optimal actions affecting the sensors in a probabilistic state estimation framework, with an application in selecting optimal zoom levels for a ...
Benjamin Deutsch, Matthias Zobel, Joachim Denzler,...
The newly introduced Microprocessor Architecture for Java Computing MAJC supports parallelism in a hierarchy of levels: multiprocessors on chip,vertical micro threading, instruct...
The purpose of this study is to automatically extract telop and flip characters. It starts from the extraction of stable frame sections including the telop and flip characters. Ne...
We report on the design and implementation of a system which automates the process of capturing structured documents from the optically recognized form of printed materials. The sy...