• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 660
Next 10 →

DENSE APPEARANCE MODELING AND EFFICIENT LEARNING OF CAMERA TRANSITIONS FOR PERSON RE-IDENTIFICATION

by Martin Hirzer, Csaba Beleznai, Martin Köstinger, Peter M. Roth, Horst Bischof
"... One central task in many visual surveillance scenarios is person re-identification, i.e., recognizing an individual person across a network of spatially disjoint cameras. Most successful recognition approaches are either based on direct modeling of the human appearance or on machine learning. In thi ..."
Abstract - Add to MetaCart
One central task in many visual surveillance scenarios is person re-identification, i.e., recognizing an individual person across a network of spatially disjoint cameras. Most successful recognition approaches are either based on direct modeling of the human appearance or on machine learning

Remote Feature Learning for Mobile Re-Identification

by Marco Vernier, Niki Martinel, Christian Micheloni, Gian Luca Foresti - In International conference on Distributed Smart Cameras, Palm , 2013
"... Abstract—This work introduces a novel method for person re-identification using embedded smart cameras. State-of-the-art methods address the re-identification problem using global and local features, metric learning and feature transformation algorithms. Such methods require advanced systems with hi ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
Abstract—This work introduces a novel method for person re-identification using embedded smart cameras. State-of-the-art methods address the re-identification problem using global and local features, metric learning and feature transformation algorithms. Such methods require advanced systems

CAN FEATURE-BASED INDUCTIVE TRANSFER LEARNING HELP PERSON RE-IDENTIFICATION?

by Yang Wu, Wei Li, Michihiko Minoh, Masayuki Mukunoki
"... Person re-identification concerns about the problem of recognizing people across space (captured by different cam-eras) and/or over time gaps. Though recently the literature on it grows rapidly, all the proposed solutions have treated it as a normal classification or ranking problem. In this paper, ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
method-ology: feature-based inductive transfer learning, for person re-identification. Extensive experiments on standard datasets with typical methods result in several important findings. Index Terms — Person re-identification, transfer learn-ing, inductive transfer learning, feature mapping

Person Re-Identification with Discriminatively Trained Viewpoint Invariant Dictionaries

by Srikrishna Karanam, Yang Li, Richard J. Radke
"... This paper introduces a new approach to address the person re-identification problem in cameras with non-overlapping fields of view. Unlike previous approaches that learn Mahalanobis-like distance metrics in some trans-formed feature space, we propose to learn a dictionary that is capable of discrim ..."
Abstract - Add to MetaCart
This paper introduces a new approach to address the person re-identification problem in cameras with non-overlapping fields of view. Unlike previous approaches that learn Mahalanobis-like distance metrics in some trans-formed feature space, we propose to learn a dictionary that is capable

Color Models and Weighted Covariance Estimation for Person Re-Identification

by Yang Yang, Shengcai Liao, Zhen Lei, Dong Yi, Stan Z. Li
"... Abstract—Due to illumination changes, partial occlusions, and object scale differences, person re-identification over disjoint camera views becomes a challenging problem. To address this problem, a variety of image representations have been put forward. In this paper, the illumination invariance and ..."
Abstract - Add to MetaCart
its feasibility and effectiveness. Finally, image pairs are matched based on the learned distance metric. Experiments conducted on two public benchmark datasets (VIPeR and PRID 450S) show that the proposed algorithm outperforms the state-of-the-art methods. Keywords—person re-identification

CHENG et al.: CUSTOM PICTORIAL STRUCTURES FOR RE-IDENTIFICATION 1 Custom Pictorial Structures for Re-identification

by Dong Seon Cheng, Marco Cristani, Loris Bazzani, Vittorio Murino
"... We propose a novel methodology for re-identification, based on Pictorial Structures (PS). Whenever face or other biometric information is missing, humans recognize an individual by selectively focusing on the body parts, looking for part-to-part correspondences. We want to take inspiration from this ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
on that specific person, leading to what we call a Custom Pictorial Structure (CPS). CPS learns the appearance of an individual, improving the localization of its parts, thus obtaining more reliable visual characteristics for re-identification. It is based on the statistical learning of pixel attributes collected

Learning Rules that Classify E-Mail

by William W. Cohen - Proceedings of the 1996 AAAI Spring Symposium on Machine Learning and Information Access , 1996
"... wcohen~research.att.com Two methods for learning text classifiers are compared on classification problems that might arise in filtering and filing personM e-mail messages: a "traxiitionM IR " method based on TF-IDF weighting, and a new method for learning sets of "keyword-spotting rul ..."
Abstract - Cited by 198 (3 self) - Add to MetaCart
;keyword-spotting rules " based on the RIPPER rule learning algorithm. It is demonstrated that both methods obtain significant generalizations from a small number of examples; that both methods are comparable in generalization performance on problems of this type; and that both methods axe reasonably efficient, even

Multi-Shot Re-Identification with Random-Projection-Based Random Forests

by Yang Li, Ziyan Wu, Richard J. Radke
"... Human re-identification remains one of the fundamen-tal, difficult problems in video surveillance and analysis. Current metric learning algorithms mainly focus on find-ing an optimized vector space such that observations of the same person in this space have a smaller distance than ob-servations of ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
Human re-identification remains one of the fundamen-tal, difficult problems in video surveillance and analysis. Current metric learning algorithms mainly focus on find-ing an optimized vector space such that observations of the same person in this space have a smaller distance than ob

A Contextual-Bandit Approach to Personalized News Article Recommendation

by Lihong Li, Wei Chu, John Langford, Robert E. Schapire
"... Personalized web services strive to adapt their services (advertisements, news articles, etc.) to individual users by making use of both content and user information. Despite a few recent advances, this problem remains challenging for at least two reasons. First, web service is featured with dynamic ..."
Abstract - Cited by 178 (16 self) - Add to MetaCart
. The contributions of this work are three-fold. First, we propose a new, general contextual bandit algorithm that is computationally efficient and well motivated from learning theory. Second, we argue that any bandit algorithm can be reliably evaluated offline using previously recorded random traffic. Finally, using

Trail re-identification: Learning who you are from where you have been

by Bradley Malin, Latanya Sweeney, Elaine Newton , 2003
"... This paper provides algorithms for learning the identities of individuals from the trails of seemingly anonymous information they leave behind. Consider online consumers, who have the IP addresses of their computers logged at each website visited. Many falsely believe they cannot be identified. The ..."
Abstract - Cited by 18 (1 self) - Add to MetaCart
extends the concept to “trail re-identification ” in which a person is related to a trail of seemingly anonymous and homogenous data left across different locations. The 3 novel algorithms presented in this paper perform trail re-identifications by exploiting the fact that some locations
Next 10 →
Results 11 - 20 of 660
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University