Information & computer science publications
-
Robust Visual Path Following for Heterogeneous Mobile Platforms
We present an innovative path following system based upon multi-camera visual odometry and visual landmark matching.
-
GPU Accelerated Realtime Stereo for Augmented Reality
This paper presents a realtime, robust, and accurate stereo matching algorithm based on a coarse-to-fine architecture.
-
H.264 Format/Bitrate/Quality Tradeoff Study
Maximizing transmitted video quality at the highest resolution and highest frame rate is desirable,but multiple approaches can be employed to maximize transmission quality for the video at a given bitrate.
-
A Real-Time Pedestrian Detection System Based on Structure and Appearance Classification
We present a real-time pedestrian detection system based on structure and appearance classification.
-
Implementing Real-Time Imaging Systems Using the Sarnoff Acadia II Vision Processor
This paper will describe how to best use the power of the Acadia® II as both an all-in-one image processor and as a general purpose computer for performing other critical…
-
Lidar-Based Door and Stair Detection from a Mobile Robot
We present an on-the-move LIDAR-based object detection system for autonomous and semi-autonomous unmanned vehicle systems.
-
Long Range Audio and Audio-Visual Event Detection Using a Laser Doppler Vibrometer
In this work, in addition to a geo-calibrated electro-optical camera, we propose to use a novel optical sensor for real-time audio sensing, which allows us to capture acoustic signals from…
-
Automatic Blood Vessel Localization in Small Field of View Eye Images
We present an automatic technique for localizing vessels in small field of view images using multi-scale matched filters. We also estimate local vessel properties - width and orientation - along…
-
Speech-Based Automated Cognitive Status Assessment
The aim in this paper is to study the usability of automated methods for evaluating verbal cognitive status assessment tests for the elderly.
-
BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections
The BLADE (Block All Drive-by download Exploits) system asserts that all executable files delivered through browser downloads must result from explicit user consent and transparently redirects every unconsented browser download…
-
Gaussian Process Learning for Cyber-Attack Early Warning
We present a framework to estimate the relevance of each network with respect to each network. In particular, we model each attacker's relevance as a function over the networks.
-
Recognition and Volume Estimation of Food Intake Using a Mobile Device
We present a system that improves accuracy of food intake assessment using computer vision techniques.