Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting and Recognizing Abandoned Objects in Crowded Environments., and . ICVS, volume 5008 of Lecture Notes in Computer Science, page 241-250. Springer, (2008)Multi-layer Background Change Detection Based on Spatiotemporal Texture Projections., and . ICCVG, volume 5337 of Lecture Notes in Computer Science, page 282-291. Springer, (2008)Localization of detected objects in multi-camera network., and . ICIP, page 2376-2379. IEEE, (2008)Modeling Spatial-Temporal Data with a Short Observation History., , and . Knowl. Inf. Syst., 5 (3): 368-386 (2003)Spherical coverage verification., , and . Appl. Math. Comput., 218 (19): 9699-9715 (2012)Texture Dissimilarity Measures for Background Change Detection., and . ICIAR, volume 5112 of Lecture Notes in Computer Science, page 680-687. Springer, (2008)A tool for controlled knowledge discovery in spatial domains., , and . ESM, page 26-32. SCS Europe, (2000)Spherical coverage verification, , and . CoRR, (2011)Outlier Detection with Globally Optimal Exemplar-Based GMM., , and . SDM, page 145-154. SIAM, (2009)Reliability of motion features in surveillance videos., , and . Integr. Comput. Aided Eng., 12 (3): 279-290 (2005)