Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Challenging object detection and segmentation tasks can be facilitated by the availability of a reference object. However, accounting for possible transformations between the diff...
Background subtraction is a widely used paradigm to detect moving objects in video taken from a static camera and is used for various important applications such as video surveill...
We propose artificial potential fields as a support theory for a feature linking algorithm. This algorithm operates on 3D triangle meshes derived from multiple range scans of an o...
We propose an anonymous video capturing system, called "Stealth Vision", that protects the privacy of objects by fading out their appearance. In order to avoid difficult...