Author:
Stula Maja,Krstinic Damir,Seric Ljiljana
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference30 articles.
1. Beck, K., & Andres, C. (2005). Extreme programming explained: Embrace change (2nd Edition). Addison-Wesley.
2. Bellifemine, F. L., Caire, G., & Greenwood, D. (2007). Developing multi-agent systems with JADE. John Wiley & Sons.
3. Benezeth, Y., Jodoin, P. M., Emile, B., Laurent, H., & Rosenberger, C. (2008). Review and evaluation of commonly-implemented background subtraction algorithms. Proc. 19th International Conference on Pattern Recognition, Tampa, Florida, USA, pp 1–4.
4. Bodrozic, L. J., Stipanicev, D., & Stula, M. (2006). Agent based data collecting in a forest fire monitoring system. Proc. International Conference on Software, Telecommunications and Computer Networks, Split-Dubrovnik, Croatia, pp 326–330.
5. Collins, R., Lipton, A., Kanade, T., Fujiyoshi, H., Duggins, D., Tsin, Y., et al. (2000). A system for video surveillance and monitoring. Tech. report CMU-RI-TR-00-12, Robotics Institute, Carnegie Mellon University.
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献