Publications
Export 7148 results:
[ Author] Title Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
1991. Visual recovery.
1992. Behavioral Visual Motion Analysis,". Proceedings, DARPA Image Understanding Workshop. :521-541.
2009. Sensory grammars for sensor networks. Journal of Ambient Intelligence and Smart Environments. 1(1):15-21.
1988. Robust computation of intrinsic images from multiple cues. Advances in Computer Vision. 1:115-163.
1993. Active perception..
1994. Principles of computer vision. Handbook of pattern recognition and image processing (vol. 2). :1-15.
1990. Motion--Boundary Illusions and their Regularization. Proceedings of the Royal Society of London. Series B: Biological Sciences. 242(1304):75-81.
1988. The Maryland approach to image understanding. Science Applications International Corp, Proceedings: Image Understanding Workshop,. 1
1986. Computing Intrinsic Images..
1997. Visual Navigation: Flies, Bees, and UGV's. Visual navigation: from biological systems to unmanned ground vehicles.
2000. Analyzing Action Representations. Algebraic Frames for the Perception-Action CycleAlgebraic Frames for the Perception-Action Cycle. 1888:1-21.
1980. Correspondence from Correspondence. Optical Society of America, Topical Meeting on Machine Vision. :46-51.
1985. Contour, orientation and motion. Proceedings: Image Understanding Workshop (Miami Beach, FL, December 9–10, 1985). :129-136.