Cryptography Reference
In-Depth Information
Fig. 9.15. An example of retrieval results using query-by-sketch on frames from
an in-house video surveillance system. Except for the frames in the second row, all
the retrieved results (out of 108 video clips) are related to the query trajectory. The
trajectory of the clips in the second row is included because it has a very similar
shape to those of the other retrieved results.
9. Medioni, C., Cohen, I., Bremond, F., Hongeng, S., and Nevatia, R. (2001): Event
detection and analysis from video streams. IEEE Trans. Pattern Analysis and
Machine Intelligence, 23 , 873889
10. Davis, J. and Bobick, A. (1997): Representation and recognition of human move-
ment using temporal templates. Proc. IEEE Conf. Computer Vision and Pattern
Recognition, 928934
11. Davis, L., Chelappa, R., Rosenfeld, A., Harwood, D., Haritaoglu, I., and Cutler,
R. (1998): Visual surveillance and monitoring. Proc. DARPA Image Under-
standing Workshop, 7376
12. McKenna, S.J., Jabri, S., Duric, Z., Rosenfeld, A., and Wechsler, H. (2000):
Tracking groups of people. Computer Vision and Image Understanding, 80 ,
4256
13. Senior, A., Hampapur, A., Tian, Y.L., Brown, L., Pankanti, S., and Bolle, R.
(2002): Tracking people with probabilistic appearance models. Proc. Interna-
Search WWH ::




Custom Search