Sciweavers

512 search results - page 10 / 103
» Closed-loop Robust Identification Using the Direct Approach
Sort
View

Publication
335views
11 years 9 months ago
Person Re-Identification: What Features are Important?
State-of-the-art person re-identi cation methods seek robust person matching through combining various feature types. Often, these features are implicitly assigned with a single ve...
Chunxiao Liu, Shaogang Gong, Chen Change Loy, Xing...
ICASSP
2009
IEEE
14 years 2 months ago
Robust video fingerprinting based on visual attention regions
This paper presents a robust video fingerprinting based on visual attention regions. Video fingerprints, which are a set of short feature vectors, are unique to video clips and us...
Xing Su, Tiejun Huang, Wen Gao
ICPR
2010
IEEE
13 years 5 months ago
Removing Rule-Lines from Binary Handwritten Arabic Document Images Using Directional Local Profile
In this paper, we present a novel approach for detecting and removing pre-printed rule-lines from binary handwritten Arabic document images. The proposed technique is based on a d...
Zhixin Shi, Srirangaraj Setlur, Venu Govindaraju
APCCAS
2002
IEEE
156views Hardware» more  APCCAS 2002»
14 years 14 days ago
Bit-plane watermarking for zerotree-coded images
In this paper, we develop a robust bit-plane watermarking technique based on zerotree coding. A robust watermark is an imperceptible but indelible code that can be used for owners...
Shih-Hsuan Yang, Hsin-Chang Chen
ICASSP
2009
IEEE
14 years 2 months ago
Robust modeling of musical chord sequences using probabilistic N-grams
The modeling of music as a language is a core issue for a wide range of applications such as polyphonic music retrieval, automatic style identification, audio to symbolic music tr...
Ricardo Scholz, Emmanuel Vincent, Fréd&eacu...