Sciweavers

5373 search results - page 906 / 1075
» Models and Motion Planning
Sort
View
AIM
2002
15 years 4 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
CVPR
1998
IEEE
16 years 6 months ago
Using Adaptive Tracking to Classify and Monitor Activities in a Site
We describe a vision system that monitors activity in a site over extended periods of time. The system uses a distributed set of sensors to cover the site, and an adaptive tracker...
W. Eric L. Grimson, Chris Stauffer, R. Romano, L. ...
ECCV
2008
Springer
16 years 6 months ago
Learning Optical Flow
Assumptions of brightness constancy and spatial smoothness underlie most optical flow estimation methods. In contrast to standard heuristic formulations, we learn a statistical mod...
Deqing Sun, Stefan Roth, J. P. Lewis, Michael J. B...
ICCV
2009
IEEE
2061views Computer Vision» more  ICCV 2009»
16 years 9 months ago
Background Subtraction for Freely Moving Cameras
Background subtraction algorithms define the background as parts of a scene that are at rest. Traditionally, these algorithms assume a stationary camera, and identify moving obj...
Yaser Sheikh, Omar Javed, Takeo Kanade
ICCV
2009
IEEE
16 years 9 months ago
Subspace Constrained Mean-Shift
Deformable model fitting has been actively pursued in the computer vision community for over a decade. As a result, numerous approaches have been proposed with varying degrees of...
Jason M. Saragih, Simon Lucey, Jeffrey F. Cohn