Search Results

There are 19269 results for: content related to: Real-time robust 3D object tracking and estimation for surveillance system

  1. Multi-camera-based security log management scheme for smart surveillance

    Security and Communication Networks

    Volume 7, Issue 10, October 2014, Pages: 1517–1527, Daehoon Kim, Eenjun Hwang and Seungmin Rho

    Article first published online : 28 FEB 2013, DOI: 10.1002/sec.735

  2. Single authentication through in convergence space using collaborative smart cameras

    Security and Communication Networks

    Geon Woo Kim, Jong Wook Han, Deok Gyu Lee and Sang Wook Kim

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1007

  3. Video-based 3D reconstruction, laparoscope localization and deformation recovery for abdominal minimally invasive surgery: a survey

    The International Journal of Medical Robotics and Computer Assisted Surgery

    Bingxiong Lin, Yu Sun, Xiaoning Qian, Dmitry Goldgof, Richard Gitlin and Yuncheng You

    Article first published online : 30 APR 2015, DOI: 10.1002/rcs.1661

  4. You have free access to this content
    Vision-Based Trajectory Tracking System for an Emulated Quadrotor UAV

    Asian Journal of Control

    Volume 16, Issue 3, May 2014, Pages: 729–741, Francisco Jurado, Guillermo Palacios, Francisco Flores and Héctor M. Becerra

    Article first published online : 22 APR 2014, DOI: 10.1002/asjc.886

  5. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1351–1368, Fahim Sufi, Ibrahim Khalil and Ibrahim Habib

    Article first published online : 16 MAR 2011, DOI: 10.1002/sec.262

  6. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Article first published online : 30 OCT 2014, DOI: 10.1002/sec.1157

  7. A Methodology for Object Identification and Tracking in Construction Based on Spatial Modeling and Image Matching Techniques

    Computer-Aided Civil and Infrastructure Engineering

    Volume 24, Issue 3, April 2009, Pages: 199–211, Seokho Chi, Carlos H. Caldas and Dae Young Kim

    Article first published online : 14 JAN 2009, DOI: 10.1111/j.1467-8667.2008.00580.x

  8. Performance evaluation of collision avoidance schemes in ad hoc networks

    Security and Communication Networks

    Suryakant Bhandare, Taha Ben Brahim, Saad Biaz and Prathima Agrawal

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.959

  9. An aggregated signature-based fast RFID batch detection protocol

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1364–1371, Chaoliang Li, Guojun Wang and Jin Zheng

    Article first published online : 10 JUL 2013, DOI: 10.1002/sec.838

  10. SCADA communication and security issues

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 175–194, Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang and C. L. Philip Chen

    Article first published online : 24 JAN 2013, DOI: 10.1002/sec.698

  11. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Article first published online : 11 MAY 2011, DOI: 10.1002/sec.324

  12. You have free access to this content
    ON THE DETERMINISTIC DESCRIPTION OF EARTHQUAKES

    Reviews of Geophysics

    Volume 49, Issue 3, September 2011, Andrea Bizzarri

    Article first published online : 9 AUG 2011, DOI: 10.1029/2011RG000356

  13. Tracking the Actions and Possessions of Agents

    Topics in Cognitive Science

    Volume 6, Issue 4, October 2014, Pages: 599–614, Susan A. Gelman, Nicholaus S. Noles and Sarah Stilwell

    Article first published online : 11 AUG 2014, DOI: 10.1111/tops.12106

  14. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Article first published online : 26 APR 2013, DOI: 10.1002/sec.774

  15. Cooperative security management for broadband network environments

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3953–3977, Tiago Cruz, Paulo Simões, Edmundo Monteiro, Fernando Bastos and Alexandre Laranjeira

    Article first published online : 20 JUL 2015, DOI: 10.1002/sec.1313

  16. RFID system for public train transportation

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 557–571, Chin-Ling Chen and Mei-Li Chong

    Article first published online : 5 NOV 2010, DOI: 10.1002/sec.260

  17. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.374

  18. Using an autonomous robot to maintain privacy in assistive environments

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1275–1293, Christopher Armbrust, Syed Atif Mehdi, Max Reichardt, Jan Koch and Karsten Berns

    Article first published online : 8 FEB 2011, DOI: 10.1002/sec.253

  19. Combination of simple vision modules for robust real-time motion tracking

    European Transactions on Telecommunications

    Volume 6, Issue 3, May/June 1995, Pages: 275–286, Joachim Denzier and Heinrich Niemann

    Article first published online : 12 SEP 2008, DOI: 10.1002/ett.4460060308

  20. Score level fusion approach in dynamic signature verification based on hybrid wavelet-Fourier transform

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1067–1078, Wee How Khoh, Thian Song Ong, Ying Han Pang and Andrew Beng Jin Teoh

    Article first published online : 2 JUL 2013, DOI: 10.1002/sec.829