Copyright 2001 IEEE. Published in the 2001 International Conference on Image Processing (ICIP-2001), October 7-10, 2001, Thessaloniki, Greece. Personal use of this material is per...
State-of-the-art person re-identication methods seek robust person matching through combining various feature types. Often, these features are implicitly assigned with a single ve...
Background: Machine-learning tools have gained considerable attention during the last few years for analyzing biological networks for protein function prediction. Kernel methods a...
Adaptive background modeling/subtraction techniques are popular, in particular, because they are able to cope with background variations that are due to lighting variations. Unfor...
Leonid Taycher, John W. Fisher III, Trevor Darrell
Structured peer-to-peer systems--also known as key-based routing protocols--offer a base for a broad range of applications. In the past, different topology adaptation mechanisms fo...