Results 11 - 20
of
2,749
Action snippets: How many frames does human action recognition require
- In CVPR
, 2008
"... Visual recognition of human actions in video clips has been an active field of research in recent years. However, most published methods either analyse an entire video and assign it a single action label, or use relatively large lookahead to classify each frame. Contrary to these strategies, human v ..."
Abstract
-
Cited by 156 (2 self)
- Add to MetaCart
Visual recognition of human actions in video clips has been an active field of research in recent years. However, most published methods either analyse an entire video and assign it a single action label, or use relatively large lookahead to classify each frame. Contrary to these strategies, human
Progressive search space reduction for human pose estimation
- In CVPR
, 2008
"... The objective of this paper is to estimate 2D human pose as a spatial configuration of body parts in TV and movie video shots. Such video material is uncontrolled and extremely challenging. We propose an approach that progressively reduces the search space for body parts, to greatly improve the chan ..."
Abstract
-
Cited by 226 (30 self)
- Add to MetaCart
shot, by soft-labeling every pixel as belonging to a particular body part or to the background. We demonstrate upper-body pose estimation by an extensive evaluation over 70000 frames from four episodes of the TV series Buffy the vampire slayer, and present an application to fullbody action recognition
Situated action: a symbolic interpretation
- Cognitive Science
, 1993
"... The congeries of theoretical views collectively referred to as "situated action" (SA) claim that humans and their interactions with the world cannot be understood using symbol-system models and methodology, but only by observing them within real-world contexts or building nonsymbolic model ..."
Abstract
-
Cited by 163 (3 self)
- Add to MetaCart
, often under the label of "situated action " (henceforth, SA), that denies that intelligent systems are correctly characterized as physical symbol systems, and especially denies that symbolic processing lies at the heart of
The action similarity labeling challenge
- IEEE TRANSACTIONS OF PATTERN ANALYSIS AND MACHINE INTELLIGENCE (TPAMI
, 2011
"... Recognizing actions in videos is rapidly becoming a topic of much research. To facilitate the development of methods for action recognition, several video collections, along with benchmark protocols, have previously been proposed. In this paper we present a novel video database, the “Action Similari ..."
Abstract
-
Cited by 17 (5 self)
- Add to MetaCart
Similarity LAbeliNg ” (ASLAN) database, along with benchmark protocols. The ASLAN set includes thousands of videos collected from the web, in over 400 complex action classes. Our benchmark protocols focus on action similarity (same/not-same), rather than action classification, and testing is performed
Intrusion detection with unlabeled data using clustering
- In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001
, 2001
"... Abstract Intrusions pose a serious security risk in a network environment. Although systems can be hardened against many types of intrusions, often intrusions are successful making systems for detecting these intrusions critical to the security of these system. New intrusion types, of which detectio ..."
Abstract
-
Cited by 191 (6 self)
- Add to MetaCart
detection systems are unaware, are the most difficult to detect. Current signature based methods and learning algorithms which rely on labeled data to train, generally can not detect these new intrusions. In addition, labeled training data in order to train misuse and anomaly detection systems is typically
When is an illustration worth ten thousand words
- Journal of Educational Psychology
, 1990
"... In three experiments, students read expository passages concerning how scientific devices work, which contained either no illustrations (control), static illustrations of the device with labels for each part (parts), static illustrations of the device with labels for each major action (steps), or dy ..."
Abstract
-
Cited by 172 (12 self)
- Add to MetaCart
In three experiments, students read expository passages concerning how scientific devices work, which contained either no illustrations (control), static illustrations of the device with labels for each part (parts), static illustrations of the device with labels for each major action (steps
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
evoked by the CS or reward Approach Behavior Rewards elicit two forms of behavioral reactions, approach and consumption. This is because the objects are labeled with appetitive value through innate mechanisms (primary rewards) or, in most cases, classical or instrumental conditioning, after which
An overview and synthesis on timed process algebras
, 1991
"... We present anoverview and synthesis of existing results about process algebras for the speci cation and analysis of timed systems. The motivation is double: present anoverview of some relevant and representative approaches and suggest a unifying framework for them. time, we propose a general model f ..."
Abstract
-
Cited by 169 (4 self)
- Add to MetaCart
for them: transition systems whose labels are either elements ofavocabulary of actions or elements of a time domain. Many properties of this model are studied concerning their impact on description capabilities and on realisability issues. An overview of the language features of the process algebras
Coding Dialogs with the DAMSL Annotation Scheme
, 1997
"... This paper describes the DAMSL annotation scheme for communicative acts in dialog. The scheme has three layers: Forward Communicative Functions, Backward Communicative Functions, and Utterance Features. Each layer allows multiple communicative functions of an utterance to be labeled. The Forward Com ..."
Abstract
-
Cited by 165 (1 self)
- Add to MetaCart
This paper describes the DAMSL annotation scheme for communicative acts in dialog. The scheme has three layers: Forward Communicative Functions, Backward Communicative Functions, and Utterance Features. Each layer allows multiple communicative functions of an utterance to be labeled. The Forward
The Extended Cohn-Kanade Dataset (CK+): A complete dataset for action unit and emotion-specified expression
"... In 2000, the Cohn-Kanade (CK) database was released for the purpose of promoting research into automatically detecting individual facial expressions. Since then, the CK database has become one of the most widely used test-beds for algorithm development and evaluation. During this period, three limit ..."
Abstract
-
Cited by 122 (7 self)
- Add to MetaCart
limitations have become apparent: 1) While AU codes are well validated, emotion labels are not, as they refer to what was requested rather than what was actually performed, 2) The lack of a common performance metric against which to evaluate new algorithms, and 3) Standard protocols for common databases have
Results 11 - 20
of
2,749