Auto-ID technologies allow capturing the time and location of products in the supply chain for tracking and tracing. This paves the way for a variety of business applications, suc...
Over the last decades, a considerable amount of empirical knowledge about the efficiency of defect-detection techniques has been accumulated. Also a few surveys have summarised th...
Battlefield surveillance often involves a high element of risk for military operators. Hence, it is very important for the military to execute unmanned surveillance by using larg...
An Autonomous Science Agent has been flying onboard the Earth Observing One Spacecraft since 2003. This software enables the spacecraft to autonomously detect and responds to scie...
Steve A. Chien, Rob Sherwood, Daniel Tran, Benjami...
Abstract. This paper evaluates feature extraction techniques in aspect of watermark synchronization. Most watermarking algorithms suffer from geometric distortion attacks that desy...