• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 2,749
Next 10 →

Action snippets: How many frames does human action recognition require

by Konrad Schindler, Luc Van Gool - In CVPR , 2008
"... Visual recognition of human actions in video clips has been an active field of research in recent years. However, most published methods either analyse an entire video and assign it a single action label, or use relatively large lookahead to classify each frame. Contrary to these strategies, human v ..."
Abstract - Cited by 156 (2 self) - Add to MetaCart
Visual recognition of human actions in video clips has been an active field of research in recent years. However, most published methods either analyse an entire video and assign it a single action label, or use relatively large lookahead to classify each frame. Contrary to these strategies, human

Progressive search space reduction for human pose estimation

by Vittorio Ferrari, Manuel Marín-jiménez, Andrew Zisserman - In CVPR , 2008
"... The objective of this paper is to estimate 2D human pose as a spatial configuration of body parts in TV and movie video shots. Such video material is uncontrolled and extremely challenging. We propose an approach that progressively reduces the search space for body parts, to greatly improve the chan ..."
Abstract - Cited by 226 (30 self) - Add to MetaCart
shot, by soft-labeling every pixel as belonging to a particular body part or to the background. We demonstrate upper-body pose estimation by an extensive evaluation over 70000 frames from four episodes of the TV series Buffy the vampire slayer, and present an application to fullbody action recognition

Situated action: a symbolic interpretation

by Alonso H. Vera, Herbert, A. Simon, Joyce Moore, Phil Agre - Cognitive Science , 1993
"... The congeries of theoretical views collectively referred to as "situated action" (SA) claim that humans and their interactions with the world cannot be understood using symbol-system models and methodology, but only by observing them within real-world contexts or building nonsymbolic model ..."
Abstract - Cited by 163 (3 self) - Add to MetaCart
, often under the label of "situated action " (henceforth, SA), that denies that intelligent systems are correctly characterized as physical symbol systems, and especially denies that symbolic processing lies at the heart of

The action similarity labeling challenge

by Orit Kliper-Gross, Tal Hassner, Lior Wolf - IEEE TRANSACTIONS OF PATTERN ANALYSIS AND MACHINE INTELLIGENCE (TPAMI , 2011
"... Recognizing actions in videos is rapidly becoming a topic of much research. To facilitate the development of methods for action recognition, several video collections, along with benchmark protocols, have previously been proposed. In this paper we present a novel video database, the “Action Similari ..."
Abstract - Cited by 17 (5 self) - Add to MetaCart
Similarity LAbeliNg ” (ASLAN) database, along with benchmark protocols. The ASLAN set includes thousands of videos collected from the web, in over 400 complex action classes. Our benchmark protocols focus on action similarity (same/not-same), rather than action classification, and testing is performed

Intrusion detection with unlabeled data using clustering

by Leonid Portnoy, Eleazar Eskin, Sal Stolfo - In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001 , 2001
"... Abstract Intrusions pose a serious security risk in a network environment. Although systems can be hardened against many types of intrusions, often intrusions are successful making systems for detecting these intrusions critical to the security of these system. New intrusion types, of which detectio ..."
Abstract - Cited by 191 (6 self) - Add to MetaCart
detection systems are unaware, are the most difficult to detect. Current signature based methods and learning algorithms which rely on labeled data to train, generally can not detect these new intrusions. In addition, labeled training data in order to train misuse and anomaly detection systems is typically

When is an illustration worth ten thousand words

by Richard E. Mayer, Joan K. Gallini - Journal of Educational Psychology , 1990
"... In three experiments, students read expository passages concerning how scientific devices work, which contained either no illustrations (control), static illustrations of the device with labels for each part (parts), static illustrations of the device with labels for each major action (steps), or dy ..."
Abstract - Cited by 172 (12 self) - Add to MetaCart
In three experiments, students read expository passages concerning how scientific devices work, which contained either no illustrations (control), static illustrations of the device with labels for each part (parts), static illustrations of the device with labels for each major action (steps

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
evoked by the CS or reward Approach Behavior Rewards elicit two forms of behavioral reactions, approach and consumption. This is because the objects are labeled with appetitive value through innate mechanisms (primary rewards) or, in most cases, classical or instrumental conditioning, after which

An overview and synthesis on timed process algebras

by Xavier Nicollin, Joseph Sifakis , 1991
"... We present anoverview and synthesis of existing results about process algebras for the speci cation and analysis of timed systems. The motivation is double: present anoverview of some relevant and representative approaches and suggest a unifying framework for them. time, we propose a general model f ..."
Abstract - Cited by 169 (4 self) - Add to MetaCart
for them: transition systems whose labels are either elements ofavocabulary of actions or elements of a time domain. Many properties of this model are studied concerning their impact on description capabilities and on realisability issues. An overview of the language features of the process algebras

Coding Dialogs with the DAMSL Annotation Scheme

by Mark G. Core, James F. Allen , 1997
"... This paper describes the DAMSL annotation scheme for communicative acts in dialog. The scheme has three layers: Forward Communicative Functions, Backward Communicative Functions, and Utterance Features. Each layer allows multiple communicative functions of an utterance to be labeled. The Forward Com ..."
Abstract - Cited by 165 (1 self) - Add to MetaCart
This paper describes the DAMSL annotation scheme for communicative acts in dialog. The scheme has three layers: Forward Communicative Functions, Backward Communicative Functions, and Utterance Features. Each layer allows multiple communicative functions of an utterance to be labeled. The Forward

The Extended Cohn-Kanade Dataset (CK+): A complete dataset for action unit and emotion-specified expression

by Patrick Lucey, Jeffrey F. Cohn, Takeo Kanade, Jason Saragih, Zara Ambadar, Iain Matthews
"... In 2000, the Cohn-Kanade (CK) database was released for the purpose of promoting research into automatically detecting individual facial expressions. Since then, the CK database has become one of the most widely used test-beds for algorithm development and evaluation. During this period, three limit ..."
Abstract - Cited by 122 (7 self) - Add to MetaCart
limitations have become apparent: 1) While AU codes are well validated, emotion labels are not, as they refer to what was requested rather than what was actually performed, 2) The lack of a common performance metric against which to evaluate new algorithms, and 3) Standard protocols for common databases have
Next 10 →
Results 11 - 20 of 2,749
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University