Sciweavers

TMC
2012
12 years 1 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
TVCG
2012
181views Hardware» more  TVCG 2012»
12 years 1 months ago
Interactive Image Segmentation Based on Level Sets of Probabilities
—In this paper, we present a robust and accurate algorithm for interactive image segmentation. The level set method is clearly advantageous for image objects with a complex topol...
Yugang Liu, Yizhou Yu
CVPR
2012
IEEE
12 years 1 months ago
Scale resilient, rotation invariant articulated object matching
A novel method is proposed for matching articulated objects in cluttered videos. The method needs only a single exemplar image of the target object. Instead of using a small set o...
Hao Jiang, Tai-Peng Tian, Kun He, Stan Sclaroff
PAMI
2012
12 years 1 months ago
Quantifying and Transferring Contextual Information in Object Detection
— Context is critical for reducing the uncertainty in object detection. However, context modelling is challenging because there are often many different types of contextual infor...
Wei-Shi Zheng, Shaogang Gong, Tao Xiang
WACV
2012
IEEE
12 years 6 months ago
Online discriminative object tracking with local sparse representation
We propose an online algorithm based on local sparse representation for robust object tracking. Local image patches of a target object are represented by their sparse codes with a...
Qing Wang, Feng Chen, Wenli Xu, Ming-Hsuan Yang
LACL
2011
Springer
13 years 1 months ago
Using Logic in the Generation of Referring Expressions
The problem of generating referring expressions (GRE) is an important task in natural language generation. In this paper, we advocate for the use of logical languages in the output...
Carlos Areces, Santiago Figueira, Daniel Gor&iacut...
ICMCS
2009
IEEE
158views Multimedia» more  ICMCS 2009»
13 years 8 months ago
View management of annotations for wearable augmented reality
In annotation overlay applications using augmented reality (AR), view management is widely used for improving readability and intelligibility of the annotations. In order to recog...
Koji Makita, Masayuki Kanbara, Naokazu Yokoya
ACL
2010
13 years 8 months ago
Employing Personal/Impersonal Views in Supervised and Semi-Supervised Sentiment Classification
In this paper, we adopt two views, personal and impersonal views, and systematically employ them in both supervised and semi-supervised sentiment classification. Here, personal vi...
Shoushan Li, Chu-Ren Huang, Guodong Zhou, Sophia Y...
JOT
2006
104views more  JOT 2006»
13 years 10 months ago
Call-out Bracket Methods in Timor
This paper extends the concept of qualifying types by describing how their implementations can include not only bracket methods which are applied when a method of a target object ...
James Leslie Keedy, Klaus Espenlaub, Christian Hei...
MVA
1996
168views Computer Vision» more  MVA 1996»
14 years 4 days ago
Real-time Tracking with Kalman Filter
automatically updated during the matching process, This paper describes a real-time tracking system which detects an object entering into the field of view of camera and executes t...
Dae-Sik Jang, Hyung-Il Choi, Gye-Young Kim