• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 51,160
Next 10 →

Regular Types for Active Objects

by Oscar Nierstrasz , 1995
"... Previous work on type-theoretic foundations for object-oriented programming languages has mostly focused on applying or extending functional type theory to functional "objects." This approach, while benefiting from a vast body of existing literature, has the disadvantage of dealing with st ..."
Abstract - Cited by 207 (5 self) - Add to MetaCart
as regular (finite state) processes that provide guarantees of service along public channels. We also propose a new notion of subtyping for active objects, based on Brinksma's notion of extension, that extends Wegner and Zdonik's "principle of substitutability" to non-uniform service

Active Object -- An Object Behavioral Pattern for . . .

by R. Greg Lavender , Douglas C. Schmidt , 1996
"... This paper describes the Active Object pattern, which decouples method execution from method invocation in order to simplify synchronized access to an object that resides in its own thread of control. The Active Object pattern allows one or more independent threads of execution to interleave their a ..."
Abstract - Cited by 163 (44 self) - Add to MetaCart
This paper describes the Active Object pattern, which decouples method execution from method invocation in order to simplify synchronized access to an object that resides in its own thread of control. The Active Object pattern allows one or more independent threads of execution to interleave

Geodesic Active Contours

by Vicent Caselles, Ron Kimmel, Guillermo Sapiro , 1997
"... A novel scheme for the detection of object boundaries is presented. The technique is based on active contours evolving in time according to intrinsic geometric measures of the image. The evolving contours naturally split and merge, allowing the simultaneous detection of several objects and both in ..."
Abstract - Cited by 1425 (47 self) - Add to MetaCart
A novel scheme for the detection of object boundaries is presented. The technique is based on active contours evolving in time according to intrinsic geometric measures of the image. The evolving contours naturally split and merge, allowing the simultaneous detection of several objects and both

Active Contours without Edges

by Tony F. Chan, Luminita A. Vese , 2001
"... In this paper, we propose a new model for active contours to detect objects in a given image, based on techniques of curve evolution, Mumford--Shah functional for segmentation and level sets. Our model can detect objects whose boundaries are not necessarily defined by gradient. We minimize an energy ..."
Abstract - Cited by 1206 (38 self) - Add to MetaCart
In this paper, we propose a new model for active contours to detect objects in a given image, based on techniques of curve evolution, Mumford--Shah functional for segmentation and level sets. Our model can detect objects whose boundaries are not necessarily defined by gradient. We minimize

On active contour models and balloons

by D. Cohen - CVGIP: Image
"... The use.of energy-minimizing curves, known as “snakes, ” to extract features of interest in images has been introduced by Kass, Witkhr & Terzopoulos (Znt. J. Comput. Vision 1, 1987,321-331). We present a model of deformation which solves some of the problems encountered with the original method. ..."
Abstract - Cited by 588 (43 self) - Add to MetaCart
curve need no longer be close to the solution to converge. The curve passes over weak edges and is stopped only if the edge is strong. We give examples of extracting a ventricle in medical images. We have also made a first step toward 3D object reconstruction, by tracking the extracted contour on a

W4: Real-time surveillance of people and their activities

by Ismail Haritaoglu, David Harwood, Larry S. Davis - IEEE Transactions on Pattern Analysis and Machine Intelligence , 2000
"... w4 is a real time visual surveillance system for detecting and tracking multiple people and monitoring their activities in an outdoor environment. It operates on monocular gray-scale video imagery, or on video imagery from an infrared camera. W4 employs a combination of shape analysis and tracking t ..."
Abstract - Cited by 709 (9 self) - Add to MetaCart
w4 is a real time visual surveillance system for detecting and tracking multiple people and monitoring their activities in an outdoor environment. It operates on monocular gray-scale video imagery, or on video imagery from an infrared camera. W4 employs a combination of shape analysis and tracking

Learning Patterns of Activity Using Real-Time Tracking

by Chris Stauffer, W. Eric L. Grimson - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 2000
"... Our goal is to develop a visual monitoring system that passively observes moving objects in a site and learns patterns of activity from those observations. For extended sites, the system will require multiple cameras. Thus, key elements of the system are motion tracking, camera coordination, activit ..."
Abstract - Cited by 898 (10 self) - Add to MetaCart
Our goal is to develop a visual monitoring system that passively observes moving objects in a site and learns patterns of activity from those observations. For extended sites, the system will require multiple cameras. Thus, key elements of the system are motion tracking, camera coordination

Information-Based Objective Functions for Active Data Selection

by David J.C. MacKay - Neural Computation
"... Learning can be made more efficient if we can actively select particularly salient data points. Within a Bayesian learning framework, objective functions are discussed which measure the expected informativeness of candidate measurements. Three alternative specifications of what we want to gain infor ..."
Abstract - Cited by 428 (4 self) - Add to MetaCart
Learning can be made more efficient if we can actively select particularly salient data points. Within a Bayesian learning framework, objective functions are discussed which measure the expected informativeness of candidate measurements. Three alternative specifications of what we want to gain

SAMOS: an Active Object-Oriented Database System

by Stella Gatziu, Klaus R. Dittrich , 1992
"... events are not detected by SAMOS, but users/applications have to notify the system about their occurrence by issuing an explicit raise operation. 2.2 Composite events The kinds of primitive events described above correspond to elementary occurrences and are not adequate for handling events that occu ..."
Abstract - Cited by 220 (9 self) - Add to MetaCart
events are not detected by SAMOS, but users/applications have to notify the system about their occurrence by issuing an explicit raise operation. 2.2 Composite events The kinds of primitive events described above correspond to elementary occurrences and are not adequate for handling events that occur when some combination of other events happens. Thus, SAMOS supports composite events built from others by means of six event constructors. The disjunction of events (E1jE2) occurs when either E1 or E2 occurs. The conjunction of events (E1,E2) occurs when E1 and E2 occur, regardless of order. A sequence of events (E1;E2) occurs when first E1 and afterwards E2 occurs. The following three constructors monitor the occurrence of event instances of a specific event class during a predefined time interval. A composite event with the "*" -constructor (*E) will be signalled (and the corresponding rules will be executed) only once (after the first occurrence of E), even if the event E occurs sever...

LOF: Identifying density-based local outliers

by Markus M Breunig , Hans-Peter Kriegel , Raymond T Ng , Jörg Sander - MOD , 2000
"... For many KDD applications, such as detecting criminal activities in E-commerce, finding the rare instances or the outliers, can be more interesting than finding the common patterns. Existing work in outlier detection regards being an outlier as a binary property. In this paper, we contend that for ..."
Abstract - Cited by 516 (13 self) - Add to MetaCart
For many KDD applications, such as detecting criminal activities in E-commerce, finding the rare instances or the outliers, can be more interesting than finding the common patterns. Existing work in outlier detection regards being an outlier as a binary property. In this paper, we contend
Next 10 →
Results 1 - 10 of 51,160
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University