• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,259
Next 10 →

Neural Network-Based Face Detection

by Henry A. Rowley, Shumeet Baluja, Takeo Kanade - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 1998
"... We present a neural network-based upright frontal face detection system. A retinally connected neural network examines small windows of an image and decides whether each window contains a face. The system arbitrates between multiple networks to improve performance over a single network. We present ..."
Abstract - Cited by 1206 (22 self) - Add to MetaCart
We present a neural network-based upright frontal face detection system. A retinally connected neural network examines small windows of an image and decides whether each window contains a face. The system arbitrates between multiple networks to improve performance over a single network. We present

Actions as space-time shapes

by Lena Gorelick, Moshe Blank, Eli Shechtman, Michal Irani, Ronen Basri - IN ICCV , 2005
"... Human action in video sequences can be seen as silhouettes of a moving torso and protruding limbs undergoing articulated motion. We regard human actions as three-dimensional shapes induced by the silhouettes in the space-time volume. We adopt a recent approach [14] for analyzing 2D shapes and genera ..."
Abstract - Cited by 651 (4 self) - Add to MetaCart
and generalize it to deal with volumetric space-time action shapes. Our method utilizes properties of the solution to the Poisson equation to extract space-time features such as local space-time saliency, action dynamics, shape structure and orientation. We show that these features are useful for action

An affine invariant interest point detector

by Krystian Mikolajczyk, Cordelia Schmid - In Proceedings of the 7th European Conference on Computer Vision , 2002
"... Abstract. This paper presents a novel approach for detecting affine invariant interest points. Our method can deal with significant affine transformations including large scale changes. Such transformations introduce significant changes in the point location as well as in the scale and the shape of ..."
Abstract - Cited by 1467 (55 self) - Add to MetaCart
comparison of our detector with existing ones shows a significant improvement in the presence of large affine deformations. Experimental results for wide baseline matching show an excellent performance in the presence of large perspective transformations including significant scale changes. Results

Detecting intrusion using system calls: alternative data models

by Christina Warrender, Stephanie Forrest, Barak Pearlmutter - In Proceedings of the IEEE Symposium on Security and Privacy , 1999
"... Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable— sequences of system calls into the kernel of an operating system. Using system-call data sets generated by several differen ..."
Abstract - Cited by 433 (3 self) - Add to MetaCart
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable— sequences of system calls into the kernel of an operating system. Using system-call data sets generated by several

A Comparison of Feature Combination Strategies for Saliency-Based Visual Attention Systems

by Laurent Itti, Christof Koch - Journal of Electronic Imaging , 1999
"... Bottom-up or saliency-based visual attention allows primates to detect non-specific conspicuous targets in cluttered scenes. A classical metaphor, derived from electrophysiological and psychophysical studies, describes attention as a rapidly shiftable "spotlight". The model described here ..."
Abstract - Cited by 196 (23 self) - Add to MetaCart
Bottom-up or saliency-based visual attention allows primates to detect non-specific conspicuous targets in cluttered scenes. A classical metaphor, derived from electrophysiological and psychophysical studies, describes attention as a rapidly shiftable "spotlight". The model described here

Multiple Kernels for Object Detection

by Andrea Vedaldi, Varun Gulshan, Manik Varma, Andrew Zisserman
"... Our objective is to obtain a state-of-the art object category detector by employing a state-of-the-art image classifier to search for the object in all possible image subwindows. We use multiple kernel learning of Varma and Ray (ICCV 2007) to learn an optimal combination of exponential χ 2 kernels, ..."
Abstract - Cited by 275 (10 self) - Add to MetaCart
(CVPR 2007) based on proposing windows from scale invariant features); and (iii) introducing overlap-recall curves as a mean to compare and optimize the performance of the intermediate pipeline stages. The method is evaluated on the PASCAL Visual Object Detection Challenge, and exceeds the performances

Maximum Lifetime Routing In Wireless Sensor Networks

by Jae-hwan Chang, Leandros Tassiulas - IEEE/ACM TRANSACTIONS ON NETWORKING , 2000
"... Routing in power-controlled wireless sensor networks is formulated as an optimization problem with the goal of maximizing the system lifetime. Considering that the information is delivered in the form of packets, we identified the problem as an integer programming problem. It is known that the syste ..."
Abstract - Cited by 282 (0 self) - Add to MetaCart
and examined in order to find the best link cost function and the method of shortest path calculation. The performance comparison is made through simulation in a typical battlefield scenario where sensors detecting a moving target vehicle periodically send a reporting packet to one of the gateway nodes

Fidelity and yield in a volcano monitoring sensor network

by Geoff Werner-allen, Konrad Lorincz, Jeff Johnson, Jonathan Lees, Matt Welsh - In Proc. 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2006 , 2006
"... We present a science-centric evaluation of a 19-day sensor network deployment at Reventador, an active volcano in Ecuador. Each of the 16 sensors continuously sampled seismic and acoustic data at 100 Hz. Nodes used an event-detection algorithm to trigger on interesting volcanic activity and initiate ..."
Abstract - Cited by 276 (11 self) - Add to MetaCart
describe an approach to time rectification of the acquired signals that can recover accurate timing despite failures of the underlying time synchronization protocol. In addition, we perform a detailed study of the sensor network’s data using a direct comparison to a standalone data logger, as well

Wavelet Analysis of Long Range Dependent Traffic

by Patrice Abry, Darryl Veitch - IEEE TRANSACTIONS ON INFORMATION THEORY , 1998
"... A Wavelet based tool for the analysis of long range dependence is introduced and a related semiparametric estimator of the Hurst parameter. The estimator is shown to be unbiased under very general conditions, and efficient under Gaussian assumptions. It can be implemented very efficiently allowing t ..."
Abstract - Cited by 268 (22 self) - Add to MetaCart
the direct analysis of very large data sets, and is highly robust against the presence of deterministic trends, as well as allowing their detection and identification. Statistical, computational and numerical comparisons are made against traditional estimators including that of Whittle. The estimator is used

Robust Face Detection Using the Hausdorff Distance

by Oliver Jesorsky, Klaus J. Kirchberg, Robert W. Frischholz , 2001
"... The localization of human faces in digital images is a fundamental step in the process of face recognition. This paper presents a shape comparison approach to achieve fast, accurate face detection that is robust to changes in illumination and background. The proposed method is edge-based and works o ..."
Abstract - Cited by 212 (1 self) - Add to MetaCart
The localization of human faces in digital images is a fundamental step in the process of face recognition. This paper presents a shape comparison approach to achieve fast, accurate face detection that is robust to changes in illumination and background. The proposed method is edge-based and works
Next 10 →
Results 1 - 10 of 6,259
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University