Author of the publication

AVSS 2011 demo session: A systems level approach to perimeter protection.

, , , , , , , and . AVSS, page 517-518. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dissertation abstracts., , , , and . Mach. Vis. Appl., 2 (2): 117-120 (1989)Extensive articulated human detection by voting Cluster Boosted Tree., , and . WACV, page 1-8. IEEE Computer Society, (2009)A systems level approach to perimeter protection., , , , , , , and . WACV, page 257-262. IEEE Computer Society, (2012)MAC: Mining Activity Concepts for Language-based Temporal Localization., , , and . CoRR, (2018)SPAN: Spatial Pyramid Attention Network for Image Manipulation Localization., , , , , and . ECCV (21), volume 12366 of Lecture Notes in Computer Science, page 312-328. Springer, (2020)Review of Ärtificial Intelligence: An MIT Perspective, vol. 2 by P. H. Winston and R. H. Brown"; MIT Press 1982. SIGART Newsl., (1983)VERL: An Ontology Framework for Representing and Annotating Video Events, , , and . IEEE MultiMedia, (2005)MixNorm: Test-Time Adaptation Through Online Normalization Estimation., , , , , , and . CoRR, (2021)Every Pixel Counts ++: Joint Learning of Geometry and Motion with 3D Holistic Understanding., , , , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 42 (10): 2624-2641 (2020)Multimodal Neural Radiance Field., , , , , , , and . ICRA, page 9393-9399. IEEE, (2023)