Klimis Ntalianis

Klimis Ntalianis
  • University of West Attica

About

106
Publications
19,340
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
551
Citations
Current institution
University of West Attica

Publications

Publications (106)
Article
Several of our Czech colleagues have brought to our attention a publication available at [1]. We wish to express our concern regarding the inclusion of references to WSEAS in this publication. These references are factually incorrect and misleading. In reality, WSEAS has no connection to the content or context described. The report, titled “Predato...
Article
This report examines the "WSEAS Transactions on Power Systems" to determine whether it meets the criteria of a legitimate, highquality scientific journal. By analyzing its editorial policies, peer review process, indexing status, impact factor, and expert testimonials, this study establishes that the journal is not predatory but rather a reputable...
Article
WSEAS has shifted away from directly publishing conference proceedings, they collaborate with reputable publishers like IEEE for certain conferences. Historically, WSEAS published its own conference proceedings. However, recent information indicates that WSEAS no longer publishes conference proceedings directly. Instead, they recommend conferences...
Article
Full-text available
Critical infrastructures play a central role in the welfare of contemporary societies and they should properly function 24/7. Since their role is so important, they regularly become targets of malicious parties, terrorists, industrial spies, and even hostile governments. In this paper, the scenario of cyber or physical attacks to CIs from tiny auto...
Article
Full-text available
Protection of urban critical infrastructures (CIs) from GPS-denied, bomb-carrying kamikaze drones (G-B-KDs) is very challenging. Previous approaches based on drone jamming, spoofing, communication interruption and hijacking cannot be applied in the case under examination, since G-B-KDs are uncontrolled. On the other hand, drone capturing schemes an...
Article
Full-text available
The purpose of this study is to investigate health care consumers' perceptions of the presence of a smartphone application that provides: (a) information on the waiting time in the Emergency Department (ED), (b) the available medical specializations per hospital, and (c) guidance in emergency instances.The study's sample included 121 people who use...
Book
Full-text available
Presents research works in the field of sentiment analysis and deep learning Provides original works presented at ICSADL 2022 held in Songkhla, Thailand Serves as a reference for researchers and practitioners in academia and industry
Article
Balancing energy consumption to prolong the life of a wireless sensor network is a challenging issue for researchers. Most of the energy of a sensor node is consumed in transmitting the data from the sensor node to sink and receiving data from other sensor nodes in multi-hop transmission. That is because the energy consumption is directly proportio...
Chapter
This paper focuses on new technologies in education, especially aesthetics and cosmetology. The rapid development of technology and the pandemic of Covid19 demonstrated the need for the integration of information and communication technologies (ICT), supporting the educational practice and changing the traditional way of learning. At the same time...
Article
Full-text available
We will try to prove in this study that WSEAS does not have any relation with fake and predatory publishers. In this article we use the criteria of Megan O'Donnell in the web site https://instr.iastate.libguides.com/predatory/id for Predatory Publishers, [1] .Mihiretu Kebede, Anna E. Schmaus-Klughammer and Brook Tesfaye Tekle in their recent articl...
Article
Full-text available
In the last decades, some publishers are intensively exploiting the model of open access publishing. During the last several years, studies have shown that there was a substantial increase in the number of fake publishers and hijacked journals. These cyber criminals make money by stealing the identities of legitimate journals and collecting the art...
Article
Full-text available
Critical infrastructures are assets of invaluable importance, essential for the whole world. Since they serve core functions of our societies, they often become targets of terrorists. Many critical infrastructures are vulnerable, due to their short distance from public roads and in the past years, several vehicle-bomb incidents have been recorded....
Article
Full-text available
In this paper, the parameters that shape online reputation of a company and the two-way relation between the effect reputation has on consumer behavior and the effect consumer behavior has on reputation are examined. The contribution of this work lies in the fact that it concerns Greek consumers. Moreover, it is important to highlight the particula...
Book
This book is a collection of papers presented at the International Conference on Intelligent Computing, Information and Control Systems (ICICCS 2020). It encompasses various research works that help to develop and advance the next-generation intelligent computing and control systems. The book integrates the computational intelligence and intelligen...
Article
This article discusses the concept of blockchain and its application to public administration research as a tool to increase trust in the government. The contribution of this article is that it unveils the advantages and disadvantages of blockchain so that both decision-makers (who intend to adopt this innovative technology to increase the transpar...
Conference Paper
Full-text available
Purpose-The purpose of this paper is to contribute to the exploration of crowdsourcing's usage in the public sector by tracings its conceptual structure, application's advantages and potential adoption from the government's or the citizen's side. Design/methodology/approach-A systematic narrative literature review is the suggested method, which cap...
Article
Full-text available
The current article discusses the concept of government as a service through the use of cloud computing which is managed from a public community, such as the citizens of a municipality. It suggests a potential architecture of a gamified community cloud in order to transform cloud computing management to an enjoyable and valuable experience. The arc...
Article
Full-text available
The Conference MMCTSE 2020 was in collaboration with the Journal “WSEAS Transactions on Business and Economics”. In this paper, the Metrics, the Peer Review and some statistical results of this Journal: “WSEAS Transactions on Business and Economics” is outlined.
Article
Full-text available
In recent years there has been a growing demand for online services. These web services include online shopping and booking, internet telephony, audio and video streaming, email, social networking, information retrieval and more. In an effort to meet the ever increasing demands of these various applications, the e-service providers strive to provid...
Book
From past decades, Computational intelligence embraces a number of nature-inspired computational techniques which mainly encompasses fuzzy sets, genetic algorithms, artificial neural networks and hybrid neuro-fuzzy systems to address the computational complexities such as uncertainties, vagueness and stochastic nature of various computational probl...
Book
This book presents the proceedings of the International Conference on Computing Networks, Big Data and IoT [ICCBI 2019], held on December 19–20, 2019 at the Vaigai College of Engineering, Madurai, India. Recent years have witnessed the intertwining development of the Internet of Things and big data, which are increasingly deployed in computer netwo...
Article
Full-text available
The mobile revolution is changing the way we interact with the people and things around us. Proximity awareness, the ability to actively/passively and continuously search for relevant value in one’s physical/virtual proximity, is at the core of this phenomenon.
Article
Full-text available
In this paper an innovative geographical locations’ rating scheme is presented, which is based on crowdsensing and crowdsourcing. People sense their surrounding space and submit evaluations through: (a) a smartphone application, and (b) a prototype website. Both have been implemented using state-of-art technologies. Evaluations are pairs of feeling...
Article
Purpose This paper aims to propose an elementary approach towards the measurement of a globoidal cam profile used in an automatic tool changer (ATC) of computer numerical control (CNC) machines. Design/methodology/approach A simple and unique online method has been designed for the profile metrology of the cam. This simple methodology will repla...
Article
Full-text available
Crowdsourcing has been extensively used in the private sector and recently adopted by the public sector. The current paper discusses the use of the mobile crowdsourcing in the public administration from both managerial and technological perspectives by exploring its current use and research challenges. The authors classify the mobile crowdsourcing...
Chapter
During the last decade Twitter has undergone a massive growth and several algorithms have been proposed for analysing its content. A common challenge is identifying user interests. In this work, we focus on personalizing the consumption of tweets by taking into consideration the tweets profile of each user (average tweet). In particular for each us...
Article
Full-text available
The evolution of artificial intelligence boosts its usage in the private sector, however the public sector seems to lag behind. There are specific reasons which prevent the public servants and the citizens from using this innovative technology. This paper first identifies the advantages and potential challenges for the implementation of the artific...
Book
This book reports on advanced theories and methods in three related fields of research: applied physics, system science and computers. The first part covers applied physics topics, such as lasers and accelerators; fluid dynamics, optics and spectroscopy, among others. It also addresses astrophysics, security, and medical and biological physics. The...
Book
This book reports on advanced theories and methods in three related fields of research: applied physics, system science and computers. It is organized in three parts, the first of which covers applied physics topics, including lasers and accelerators; condensed matter, soft matter and materials science; nanoscience and quantum engineering; atomic,...
Conference Paper
Full-text available
Internet of Things (IoT) technology enables the transformation of urban habitation towards Smart Cities. 70% of human habitation will live in Smart Cities by 2050. IoT is the backbone technology of Smart Cities enabling new services through certain structural parameters. One such parameter is the smart way of living which aims in providing all the...
Chapter
Full-text available
Internet of Things (IoT) enables Smart Cities (SC) with novel services for the citizens’ well-being. A Smart Parking (SP) system is an important part of the SC infrastructure, which enables the efficient handling of the demanding SC traffic congestion conditions. Such a system also protects the urban environment towards a green ecosystem. In this p...
Conference Paper
Full-text available
A large number of companies, organizations and other entities collect and elaborate personal data from people, which are frequently published for research or other promotional purposes. This paper deals with the effective anonymization, in applications that store data in relational databases. The optimum choice of a privacy model along with its app...
Conference Paper
With reference to the current issue of energy efficiency of residential buildings, the aim of this research is to analyze the possible influence of the energy performance component on the property prices formation. The study sample consists of two hundred residential units recently sold and located in the city of Bari (Italy). The implemented metho...
Article
Full-text available
The current paper explores the implementation of gamification in the government as a way to win back trust from the citizens. The motivation of the citizens to interact with the public authorities through e-government, requires a suitable gamification framework. Octalysis framework is chosen among the available gamification frameworks due to its mo...
Article
As regards the assessment of the market values of properties that compose real estate portfolios, in this research an automated valuation model has been proposed and tested. In particular, the method defined allows to provide for objective, reliable and "quick" valuations of the assets in the phases of periodic reviews of the property values. Aimin...
Article
Full-text available
Earth population is moving towards urban areas forming Smart Cities (SC). Waste management is a component of SCs. We consider a SC which contains a distribution of waste bins and a distribution of waste trucks located in the SC sectors. Bins and trucks are enabled with IoT sensors and actuators. Prior approaches focus mainly on the dynamic scheduli...
Article
In this paper, a new representation for the chi-squared distribution has been derived over wireless sensor networks (WSN). The underlying correlated data proliferation protocols have strong influence on performance of the deployed system. A proposed model has been deployed to investigate the WSN system over the data proliferation aspect. Initially,...
Book
This book reports on advanced theories and methods in three related fields of research: applied physics, system science and computers. It is organized in two main parts, the first of which covers applied physics topics, including lasers and accelerators; condensed matter, soft matter and materials science; nanoscience and quantum engineering; atomi...
Conference Paper
Full-text available
Smartphone sensing enables efficient Time-of-Arrival (ToA) estimation of moving cyclists towards traffic lights in a Smart City. GPS sensors locate the actual position of cyclists on their way to traffic lights. Since the constant use of GPS sensors drain the battery of the smartphones there is a need of efficient energy consumption techniques. In...
Conference Paper
In this paper a mass appraisal methodology for the periodic reviews of the market values of special properties that constitute the asset balance of relevant real estate portfolios has been developed. Using the information published by Italian databases, a study sample of office properties of medium and large size, located in the city of Milan (Ital...
Conference Paper
Full-text available
In this paper a novel content relatedness algorithm for social media content is proposed, based on the Explicit Semantic Analysis (ESA) technique. The proposed scheme takes into consideration social interactions. In particular starting from the vector space representation model, similarity is expressed by a summation of term weight products. In thi...
Chapter
Plain rotation, scaling, and/or translation (RST) of an image can lead to loss of watermark synchronization and thus authentication failure with standard techniques. The block-based approaches in particular, albeit strong against frequency and cropping attacks, are sensitive to geometric distortions due to the need for repositioning the blocks’ rec...
Article
Full-text available
In this paper an innovative social media content ranking scheme is proposed. The proposed unsupervised architecture takes into consideration user-content interactions, since social media posts receive likes, comments and shares from friends and other users. Additionally the influence of each user is modeled, based on the centrality theory. Towards...
Article
Full-text available
During the last decade social media have greatly flourished, reaching rapidly the amazing figures of today. According to the Search Engine Journal (http://www.searchenginejournal.com/25-insane-social-media-facts/79645/): (a) currently 684,478 pieces of content are shared on Facebook every minute, (b) people are spending 1 out of every 7 minutes on...
Article
In this paper, online human life summarization is performed, based on multimedia content, published on social media. The life summaries are also automatically annotated with events, persons, places etc. Towards this direction, initially a content preparation module is activated that includes an intelligent wrapper. The content preparation module sc...
Article
Full-text available
In this paper two efficient unsupervised video object segmentation approaches are proposed and thoroughly compared in terms of computational cost and quality of segmentation results. Both methods are based on the exploitation of depth information, estimated for stereoscopic pairs of frames. In particular, in both schemes an occlusion compensated di...
Article
In this paper two efficient unsupervised video object segmentation approaches are proposed and thoroughly compared. Both methods are based on the exploitation of depth information, estimated from stereoscopic pairs. Depth is a more efficient semantic descriptor of visual content, since usually an object is located on one depth plane. However, depth...
Conference Paper
The success of contemporary surveillance systems depends on their cost and their ability to automatically and correctly interpret events that take place in an observed environment. Correct decisions enhance the situation awareness of an operator, while wrong ones lead to false or no alarms, damaging the system's credibility. In this paper a low-cos...
Article
Full-text available
In this paper a fully automatic scheme for embedding visually recognizable watermark patterns to video objects is proposed. The architecture consists of 3 main modules. During the first module unsupervised video object extraction is performed, by analyzing stereoscopic pairs of frames. In the second module each video object is decomposed into three...
Article
Full-text available
An automatic video-object oriented steganographic system is proposed for biometrics authentication over error-prone networks. Initially, the host video object is automatically extracted through analysis of videoconference sequences. Next, the biometric pattern corresponding to the segmented video object is encrypted by a chaotic cipher module. Afte...
Article
This paper proposes an integrated framework for analyzing human actions in video streams. Despite most current approaches that are just based on automatic spatiotemporal analysis of sequences, the proposed method introduces the implicit user-in-the-loop concept for dynamically mining semantics and annotating video streams. This work sets a new and...
Article
In this article, a prototype Greek text to Greek Sign Language (GSL) conversion system is presented. The system is integrated into an educational platform that addresses the needs of teaching GSL grammar and was developed within the SYNENNOESE project (Efthimiou et al. 2004a. Developing an e-learning platform for the Greek sign language. In: K. Mie...
Conference Paper
Current low-level feature-based CBIR methods do not provide meaningful results on non-annotated content. On the other hand manual annotation is both time/money consuming and user-dependent. To address these problems in this paper we present an automatic annotation approach by clustering, in an unsupervised way, clickthrough data of search engines....
Conference Paper
Full-text available
Marketing campaigns are an important marketing process that support the communication of brands and products to the wide public. Although a campaign may be significantly different from another, the main steps have been outlined by marketing experts, making a formal representation of the campaign workflow possible. In this paper, we advocate that us...
Conference Paper
This paper proposes an integrated framework for analyzing human actions in video streams. Despite most current approaches that are just based on automatic spatiotemporal analysis of sequences, the proposed method introduces the implicit user-in-the-loop concept for dynamically mining semantics and annotating video streams. This work sets a new and...
Conference Paper
Many science and engineering problems can be formulated as optimization problems that are governed by contact distributions (multi-time Pfaff evolution systems) and by cost functionals expressed as multiple integrals or curvilinear integrals. Our paper ...
Conference Paper
Content analysis technologies give more and more emphasis on multimedia semantics. However most watermarking systems are frame-oriented and do not focus on the protection of semantic regions. As a result, they fail to protect semantic content especially in case of the copy-paste attack. In this framework, a novel unsupervised semantic region waterm...
Article
Full-text available
In this paper we address some of the issues commonly encountered in automatic image annotation systems such as simultaneous labeling with keywords corresponding to both abstract terms and object classes, multiple keyword assignment, and low accuracy of labeling due to concurrent categorization to multiple classes. We propose a hierarchical classifi...
Article
Full-text available
A novel approach is presented in this paper for improving the performance of neural network classifiers in video object tracking applications, based on a retraining procedure at the user level. The procedure includes (a) a retraining algorithm for adapting the network weights to the current conditions, (b) semantically meaningful object extraction...
Article
Full-text available
In this paper we present a novel approach for facilitating dyslexic children in learning to read fluently. We explain the motivation, general idea and initial results in terms of user requirements and system architecture. Unlike previously presented approaches, the aim of this system is to monitor the progress and perspectives of a dyslexic user an...
Article
Full-text available
In this paper, an interactive framework for efficient browsing and transmission of video sequences is presented, based on an optimal content-based video decomposition scheme. In particular each video file is analyzed to provide a multiscale structure of different "content resolution levels". This structure can be seen as a tree structure, each leve...
Conference Paper
We describe a neuron multi-layered architecture that extracts landmark points of high curvature from 2d shapes and resembles the visual pathway of primates. We demonstrate how the rotated orientation specific receptive fields of the simple neurons that were discovered by Hubel and Wiesel can perform landmark point detection on the 2d contour of the...
Conference Paper
Full-text available
A novel human video object watermarking scheme is proposed in this paper, providing copyright protection of semantic content. The proposed method focuses on the existence of face and body regions within an initial image, however other cases can also be addressed. Initially detection of human video objects is achieved using two adaptive 2-D Gaussian...
Conference Paper
A robust video object based watermarking scheme, based on Zernike and Hu moments, is proposed in this paper. Firstly, a human video object detector is applied to the initial image. Zernike and the Hu moments of each human video object are estimated and an invariant function for watermarking is incorporated. Then, the watermark is generated modifyin...
Conference Paper
A novel video object based watermarking scheme is proposed in this paper, providing copyright protection of the semantic content. To achieve this goal, an adaptive two-dimensional Gaussian model of skin color distribution is initially used in order to detect face and body regions within the initial image. An invariant watermark is then designed and...
Conference Paper
The increasing popularity of multimedia applications creates an increasing need for secure storage and transmission techniques. Especially wireless communications, which can be easily intercepted, should be protected by eavesdroppers. Towards this direction, several encryption schemes have been proposed in literature, however most of them do not co...
Article
Full-text available
In this paper a wavelet-based steganographic method is proposed for robust short-message hiding. The message is embedded into the most significant wavelet coefficients of a cover image to provide invisibility and resistance against lossy transmission over cellular networks, compression or other distortion. The architecture consists of three modules...
Conference Paper
Full-text available
In this paper an optimized and efficient technique for keyframes extraction of video sequences is proposed, which leads to selection of a meaningful set of video frames for each given shot. Initially for each frame, the singular value decomposition method is applied and a diagonal matrix is produced, containing the singular values of the frame. Aft...
Article
Full-text available
The increasing popularity of multimedia applications creates an increasing need for secure storage and transmission techniques. Especially wireless communications (satellite, mobile, RF), which can be easily intercepted, should be protected by unauthorized persons. Towards this direction several encryption schemes have been proposed in literature,...
Conference Paper
Full-text available
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia files as binary large objects, without taking into consideration regions of semantic information. These regions may need better protection or can be the only regions that...
Article
Full-text available
In this paper, a scheme for multiresolution organization of video content is proposed that enables fast browsing and effective transmission of video files. The scheme results in the construction of a five-layer tree structure. At layer 0 the root-node contains an advertising image of the whole sequence. Each node of layer 1 represents a class of sh...
Conference Paper
In this paper, a fully automatic scheme for hiding digital watermarks into videoconference objects is proposed. Initially, a face and body detection module is implemented in order to provide an initial estimation of the foreground object. Next, each foreground object is decomposed using the Shape Adaptive Discrete Wavelet Transform (SA-DWT). Afterw...
Conference Paper
Full-text available
An automatic video-object based steganographic system is proposed in this paper for multiuse message hiding. Initially video objects from different images are selected and for each video object a message is embedded into its most significant wavelet coefficients to provide invisibility and resistance against lossy transmission or other distortion....
Conference Paper
Full-text available
In this paper efficient performance generalization of neural network classifiers is accomplished, for unsupervised video object segmentation in videoconference/videophone sequences. Each time conditions change, a retraining phase is activated and the neural network classifier is adapted to the new environment. During retraining both the former and...
Conference Paper
A fully automatic system for embedding visually recognizable watermark patterns to video objects is proposed. The architecture consists of 3 main modules. In the first module, unsupervised video object extraction is performed, by analyzing stereoscopic pairs of frames. Then each video object is decomposed into three levels with ten subbands, using...
Conference Paper
In this paper a 3-module automatic watermarking system is proposed, which embeds visually recognizable patterns to video objects (VO). During the first module efficient unsupervised video object extraction is performed. In the second module the DWT is applied to the extracted VO to produce ten subbands and three pairs of subbands are formed. Next Q...
Conference Paper
Full-text available
Two unsupervised video object segmentation techniques are proposed and are compared in terms of computational cost and segmentation quality. Both methods are based on the exploitation of depth information. In particular a depth segments map is initially estimated by analyzing a stereoscopic pair of frames and applying a segmentation algorithm. Next...
Conference Paper
A wavelet-based steganographic method is proposed for robust message hiding. The message is embedded into the most significant wavelet coefficients of a cover image to provide invisibility and resistance against lossy transmission, compression or other distortion. The architecture consists of three modules. In the first module, the initial message...
Conference Paper
Two efficient unsupervised video object segmentation approaches are proposed and then extensively compared in terms of computational cost and quality of segmentation results. Both methods exploit depth information. In particular a depth segments map is initially estimated by analyzing a stereoscopic pair of frames and applying a segmentation algori...
Conference Paper
Full-text available
In this paper constrained gradient vector flow (GVF) field generation is performed, for fast and accurate unsupervised stereoscopic semantic segmentation. The scheme utilizes the information provided by a depth segments map, produced by stereo analysis methods and incorporation of a segmentation algorithm. Then a Canny edge detector is applied to t...
Conference Paper
An adaptive neural network architecture is proposed in this paper, for efficient video object segmentation and tracking in stereoscopic sequences. The scheme includes: (A) A retraining algorithm that optimally adapts the network weights to the current conditions and simultaneously minimally degrades the previous network knowledge. (B) A semanticall...
Conference Paper
Full-text available
An efficient system for unsupervised structuring of stereoscopic sequences is presented. It generates links between similar VOPs (video object planes) of different shots. Particularly after shot cut detection, for each shot, a fast, unsupervised VOP detection and tracking algorithm is applied. Then for each of the foreground VOPs of a frame, a feat...
Conference Paper
Full-text available
A multiscale video content organization scheme is proposed for fast browsing and efficient transmission of video sequences. The scheme leads to construction of a five-layer tree structure. At layer 0 the root-node is located, connected to all nodes of layer 1, each corresponding to a class of shots. Then every class of shot is expanded at layer 2....
Conference Paper
Full-text available
In this paper an efficient scheme for automatic organization of stereo-captured video sequences is presented, which exploits foreground VOP information of frames. More specifically after shot cut detection, for each frame of a shot, a fast, unsupervised foreground VOP extraction algorithm is applied, based on depth information and normalized Motion...
Article
applications (e.g. videoconference, robotvision, emergency detection) as they generally demand considerable human effort. On the other hand unsupervisedtechniques provide effectual results only when the adopted homogeneity criterion is satisfied by the analyzed sequence.Their main advantage is that they do not require human intervention.Several tec...
Article
this paper, an efficient optimal relevancefeedback mechanism is presented to improve theperformance of a content-based image retrievalsystem. In particular, the algorithm is based on anoptimal weight updating strategy, which regulatesthe importance of each image descriptor to theretrieval response. The weights are updated so thatthe correlation bet...
Conference Paper
Full-text available
Current multimedia databases contain a wealth of information in the form of audiovisual, as well as text data. Even though efficient search algorithms have been developed for either media, there still exists the need for abstract presentation and summarization of the results of database users' queries. Moreover, multimedia retrieval systems should...
Article
Full-text available
An efficient technique for summarization of stereoscopic video sequences is presented, which extracts a small but meaningful set of video frames using a content-based sampling algorithm. The proposed video-content representation provides the capability of browsing digital stereoscopic video sequences and performing more efficient content-based quer...
Article
Full-text available
This paper presents an efficient technique for unsupervised content-based segmentation in stereoscopic video sequences by appropriately combined different content descriptors in a hierarchical framework. Three main modules are involved in the proposed scheme; extraction of reliable depth information, image partition into color and depth regions and...
Conference Paper
Full-text available
The video coding standard MPEG-4 is enabling content-based functionalities by the introduction of video object planes (VOPs) which represent semantically meaningful objects. A novel fast, unsupervised semantic segmentation scheme is presented for stereoscopic sequences, which utilizes the provided depth information. Each stereo pair is first analyz...
Conference Paper
Full-text available
A modified snake-based scheme is presented for unsupervised stereoscopic semantic segmentation. The scheme utilizes the provided depth information and the power of active contours to adjust to object edges. Each stereo pair is analyzed and a depth map is constructed. Then a multiresolution implementation of the recursive shortest spanning tree (RSS...

Network

Cited By