Sciweavers

2236 search results - page 334 / 448
» Intrusion detection techniques and approaches
Sort
View
CVPR
2012
IEEE
11 years 11 months ago
Discovering important people and objects for egocentric video summarization
We present a video summarization approach for egocentric or “wearable” camera data. Given hours of video, the proposed method produces a compact storyboard summary of the came...
Yong Jae Lee, Joydeep Ghosh, Kristen Grauman
ICPR
2002
IEEE
14 years 10 months ago
Quasi-Invariants for Human Action Representation and Recognition
Although human action recognition has been the subject of much research in the past, the issue of viewpoint invariance has received scarce attention. In this paper, we present an ...
Vasu Parameswaran, Rama Chellappa
ICPR
2008
IEEE
14 years 3 months ago
Qualitative analysis of spatio-temporal event detectors
Interest point detection is an established method to select relevent image regions. Such techniques use features like corners or edges, which are known to indicate regions likely ...
Benedikt Kaiser, Gunther Heidemann
ICRA
2008
IEEE
163views Robotics» more  ICRA 2008»
14 years 3 months ago
Dealing with laser scanner failure: Mirrors and windows
— This paper addresses the problem of laser scanner failure on mirrors and windows. Mirrors and glasses are quite common objects that appear in our daily lives. However, while la...
Shao-Wen Yang, Chieh-Chih Wang
CEAS
2007
Springer
14 years 3 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury