Sciweavers

144 search results - page 25 / 29
» Hiding privacy information in video surveillance system
Sort
View
OOPSLA
2005
Springer
14 years 2 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
WWW
2003
ACM
14 years 9 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
AAAI
2004
13 years 10 months ago
Rapid Object Recognition from Discriminative Regions of Interest
Object recognition and detection represent a relevant component in cognitive computer vision systems, such as in robot vision, intelligent video surveillance systems, or multi-mod...
Gerald Fritz, Christin Seifert, Lucas Paletta, Hor...
MIR
2003
ACM
391views Multimedia» more  MIR 2003»
14 years 1 months ago
Generic sign board detection in images
Sign board detection is important for such computer vision applications as video surveillance and content based visual information retrieval. Previous researches on this topic foc...
Hua Shen, Xiaoou Tang
CVPR
2011
IEEE
13 years 11 days ago
Activity Recognition using Dynamic Subspace Angles
Cameras are ubiquitous everywhere and hold the promise of significantly changing the way we live and interact with our environment. Human activity recognition is central to under...
Octavia Camps, Mario Sznaier, Binlong Li, Teresa M...