• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 628
Next 10 →

Elliptical Head Tracking Using Intensity Gradients and Color Histograms

by Stan Birchfield , 1998
"... An algorithm for tracking a person's head is presented. The head's projection onto the image plane is modeled as an ellipse whose position and size are continually updated by a local search combining the output of a module concentrating on the intensity gradient around the ellipse's p ..."
Abstract - Cited by 331 (3 self) - Add to MetaCart
's perimeter with that of another module focusing on the color histogram of the ellipse's interior. Since these two modules have roughly orthogonal failure modes, they serve to complement one another. The result is a robust, real-time system that is able to track a person's head with enough accuracy

Kinematic Jump Processes For Monocular 3D Human Tracking

by Cristian Sminchisescu, Bill Triggs - In Int. Conf. Computer Vision & Pattern Recognition , 2003
"... A major difficulty for 3D human body tracking from monocular image sequences is the near non-observability of kinematic degrees of freedom that generate motion in depth. For known link (body segment) lengths, the strict non-observabilities reduce to twofold ‘forwards/backwards flipping ’ ambiguities ..."
Abstract - Cited by 138 (17 self) - Add to MetaCart
A major difficulty for 3D human body tracking from monocular image sequences is the near non-observability of kinematic degrees of freedom that generate motion in depth. For known link (body segment) lengths, the strict non-observabilities reduce to twofold ‘forwards/backwards flipping

Robust tracking-by-detection using a detector confidence particle filter

by Michael D. Breitenstein, Fabian Reichlin, Bastian Leibe, Esther Koller-meier Luc Van Gool, Computer Vision Laboratory - In ICCV , 2009
"... We propose a novel approach for multi-person trackingby-detection in a particle filtering framework. In addition to final high-confidence detections, our algorithm uses the continuous confidence of pedestrian detectors and online trained, instance-specific classifiers as a graded observation model. ..."
Abstract - Cited by 110 (3 self) - Add to MetaCart
. Thus, generic object category knowledge is complemented by instance-specific information. A main contribution of this paper is the exploration of how these unreliable information sources can be used for multi-person tracking. The resulting algorithm robustly tracks a large number of dynamically moving

Data from eye-tracking corpora as evidence for theories of syntactic processing complexity

by Vera Demberg, Frank Keller - Cognition , 2008
"... We evaluate the predictions of two theories of syntactic processing complexity, de-pendency locality theory (DLT) and surprisal, against the Dundee corpus, which contains the eye-tracking record of 10 participants reading 51,000 words of news-paper text. Our results show that DLT integration cost is ..."
Abstract - Cited by 85 (9 self) - Add to MetaCart
We evaluate the predictions of two theories of syntactic processing complexity, de-pendency locality theory (DLT) and surprisal, against the Dundee corpus, which contains the eye-tracking record of 10 participants reading 51,000 words of news-paper text. Our results show that DLT integration cost

Complemental Use of Multiple Cameras for Stable Tracking of Multiple Markers

by Yuki Arai, Hideo Saito
"... Abstract. In many applications of Augmented Reality (AR), rectangular mark-ers are tracked in real time by capturing with cameras. In this paper, we con-sider the AR application in which virtual objects are displayed onto markers while the markers and the cameras are freely moving. In this situation ..."
Abstract - Add to MetaCart
Abstract. In many applications of Augmented Reality (AR), rectangular mark-ers are tracked in real time by capturing with cameras. In this paper, we con-sider the AR application in which virtual objects are displayed onto markers while the markers and the cameras are freely moving

Multicamera Colour Tracking

by J. Orwell, P. Remagnino, G. A. Jones - Proceedings of Second IEEE International Workshop on Visual Surveillance , 1999
"... We propose a novel colour tracker for use in visual surveillance. The tracker is part of a framework de-signed to monitor a dynamic scene with more than one camera. Colour tracking complements spatial tracking: it can also be used over large temporal intervals, and between spatially uncalibrated cam ..."
Abstract - Cited by 27 (0 self) - Add to MetaCart
We propose a novel colour tracker for use in visual surveillance. The tracker is part of a framework de-signed to monitor a dynamic scene with more than one camera. Colour tracking complements spatial tracking: it can also be used over large temporal intervals, and between spatially uncalibrated

The Corpus of Contemporary American English as the first reliable monitor corpus

by Mark Davies - of English’, Literary and Linguistic Computing
"... The Corpus of Contemporary American English is the first large, genre-balanced corpus of any language, which has been designed and constructed from the ground up as a ‘monitor corpus’, and which can be used to accurately track and study recent changes in the language. The 400 million words corpus is ..."
Abstract - Cited by 127 (1 self) - Add to MetaCart
The Corpus of Contemporary American English is the first large, genre-balanced corpus of any language, which has been designed and constructed from the ground up as a ‘monitor corpus’, and which can be used to accurately track and study recent changes in the language. The 400 million words corpus

Unifying Büchi Complementation Constructions

by Seth Fogarty, Orna Kupferman, Moshe Y. Vardi, Thomas Wilke
"... Complementation of Büchi automata, required for checking automata containment, is of major theoretical and practical interest in formal verification. We consider two recent approaches to complementation. The first is the rank-based approach of Kupferman and Vardi, which operates over a DAG that embo ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Complementation of Büchi automata, required for checking automata containment, is of major theoretical and practical interest in formal verification. We consider two recent approaches to complementation. The first is the rank-based approach of Kupferman and Vardi, which operates over a DAG

Level set analysis for leukocyte detection and tracking

by Dipti Prasad Mukherjee, Senior Member, Nilanjan Ray, Scott T. Acton, Senior Member - IEEE Transactions on Image Processing , 2004
"... Abstract—We propose a cell detection and tracking solution using image-level sets computed via threshold decomposition. In contrast to existing methods where manual initialization is required to track individual cells, the proposed approach can automatically identify and track multiple cells by expl ..."
Abstract - Cited by 53 (2 self) - Add to MetaCart
energy functional complements shape-based segmentation with a spatial consistency based tracking technique. We demonstrate that an acceptable, expedient solution of the energy functional is possible through a search of the image-level lines: boundaries of connected components within the level sets

Raksha: A Flexible Information Flow Architecture for Software Security

by Michael Dalton, Hari Kannan, Christos Kozyrakis - In International Symposium on Computer Architecture (ISCA , 2007
"... High-level semantic vulnerabilities such as SQL injection and crosssite scripting have surpassed buffer overflows as the most prevalent security exploits. The breadth and diversity of software vulnerabilities demand new security solutions that combine the speed and practicality of hardware approache ..."
Abstract - Cited by 127 (7 self) - Add to MetaCart
approaches with the flexibility and robustness of software systems. This paper proposes Raksha, an architecture for software security based on dynamic information flow tracking (DIFT). Raksha provides three novel features that allow for a flexible hardware/software approach to security. First, it supports
Next 10 →
Results 1 - 10 of 628
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University