Information & computer science publications
-
Real-Time Vehicle Detection for Highway Driving
We present a new multi-stage algorithm for car and truck detection from a moving vehicle. The algorithm performs a search for pertinent features in three dimensions, guided by a ground…
-
Pedestrian Association and Localization in Monocular FIR Video Sequence
This paper addresses the frame-to-frame data association and state estimation problems in localization of a pedestrian relative to a moving vehicle from a monocular far infra-red video sequence.
-
Pedestrian Localization by Appearance Matching and Multi-mode Filtering
This paper addresses the frame-to-frame data association and state estimation problems in localization of a pedestrian relative to a moving vehicle from a far infra-red video sequence.
-
Infrastructure Free 6 DOF Location and Pose Estimation for Mixed Reality Systems
Mixed reality training systems using Head Mounted Displays (HMDs) require very high precision knowledge of the 3D location and 3D orientation of the user's head.
-
ACT-Vision Active Collaborative Tracking for Multiple PTZ Cameras
We describe a novel scalable approach for the management of a large number of Pan-Tilt-Zoom (PTZ) cameras deployed outdoors for persistent tracking of humans and vehicles, without resorting to the…
-
Directions in Network-Based Security Monitoring
The author discusses differences between traditional network intrusion detection and new techniques, and highlights a new freely available tool called BotHunter.
-
Cognitive Radio Policy Language and Policy Engine
The most comprehensive book on cognitive radio technologies - bringing together everything a wireless engineer needs to know in this important and growing field.
-
Constraint-Muse: a Soft-Constraint Based System for Music Therapy
We have developed a prototype tool for interactive music creation, called Constraint Muse, that uses monoidal soft constraints to ensure that a dynamically generated melody harmonizes with input from other…
-
Reasoning About Resources and Hierarchical Tasks Using OWL and SWRL
We describe our novel ways of using SWRL and discuss its limitations as well as extensions to it that we found necessary or desirable.
-
ALICE@Home: Distributed Framework for Detecting Malicious Sites
In this work, we describe alice@home, a distributed approach to overcoming multiple methods of malware infection and actively identifying malware distribution sites.
-
BLADE: Slashing the Invisible Channel of Drive-By Download Malware
We present BLADE (Block All Drive-by download Exploits), a browser-independent system that seeks to eliminate the threat of drive-by downloads, one of the dominant means through which mass malware infections…
-
Distributed Multi-Sensor Fusion for Improved Collaborative GPS-Denied Navigation
This paper addresses the problem of determining high accuracy absolute and relative 3-D positions of mobile sensor network nodes by fusing inertial and radio frequency (RF) ranging measurements to support…