• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 11,528
Next 10 →

Detecting faces in images: A survey

by Ming-hsuan Yang, David J. Kriegman, Narendra Ahuja - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 2002
"... Images containing faces are essential to intelligent vision-based human computer interaction, and research efforts in face processing include face recognition, face tracking, pose estimation, and expression recognition. However, many reported methods assume that the faces in an image or an image se ..."
Abstract - Cited by 831 (4 self) - Add to MetaCart
Images containing faces are essential to intelligent vision-based human computer interaction, and research efforts in face processing include face recognition, face tracking, pose estimation, and expression recognition. However, many reported methods assume that the faces in an image or an image sequence have been identified and localized. To build fully automated systems that analyze the information contained in face images, robust and efficient face detection algorithms are required. Given a single image, the goal of face detection is to identify all image regions which contain a face regardless of its three-dimensional position, orientation, and the lighting conditions. Such a problem is challenging because faces are nonrigid and have a high degree of variability in size, shape, color, and texture. Numerous techniques have been developed to detect faces in a single image, and the purpose of this paper is to categorize and evaluate these algorithms. We also discuss relevant issues such as data collection, evaluation metrics, and benchmarking. After analyzing these algorithms and identifying their limitations, we conclude with several promising directions for future research.

Planning Algorithms

by Steven M LaValle , 2004
"... This book presents a unified treatment of many different kinds of planning algorithms. The subject lies at the crossroads between robotics, control theory, artificial intelligence, algorithms, and computer graphics. The particular subjects covered include motion planning, discrete planning, planning ..."
Abstract - Cited by 1108 (51 self) - Add to MetaCart
This book presents a unified treatment of many different kinds of planning algorithms. The subject lies at the crossroads between robotics, control theory, artificial intelligence, algorithms, and computer graphics. The particular subjects covered include motion planning, discrete planning, planning under uncertainty, sensor-based planning, visibility, decision-theoretic planning, game theory, information spaces, reinforcement learning, nonlinear systems, trajectory planning, nonholonomic planning, and kinodynamic planning.

Knowledge representations, reasoning and declarative problem solving . . .

by Chitta Baral , 2001
"... ..."
Abstract - Cited by 714 (43 self) - Add to MetaCart
Abstract not found

A HIERARCHICAL ASM/AAM APPROACH IN A STOCHASTIC FRAMEWORK FOR FULLY AUTOMATIC TRACKING AND RECOGNITION

by Sascha Schreiber, Andre Störmer, Gerhard Rigoll, Technische Universität München
"... This paper deals with the fully automatic extraction of classifiable person features out of a video stream with challenging background. Basically the task can be split in two parts: Tracking the object and extracting distinctive features. In order to track a person, a system composed of an Active Sh ..."
Abstract - Add to MetaCart
features are transformed into appearance parameters, which finally can be used for a variety of classification tasks. The novelty of this framework is the hierarchical combination using the similarities of the models as well as exploiting their differences to enhance robustness and performance in complex

Aurora: a new model and architecture for data stream management

by Daniel J. Abadi, Don Carney, Ugur Çetintemel, Mitch Cherniack, Christian Convey, Sangdon Lee, Michael Stonebraker, Nesime Tatbul, Stan Zdonik , 2003
"... This paper describes the basic processing model and architecture of Aurora, a new system to manage data streams for monitoring applications. Monitoring applications differ substantially from conventional business data processing. The fact that a software system must process and react to continual in ..."
Abstract - Cited by 391 (31 self) - Add to MetaCart
This paper describes the basic processing model and architecture of Aurora, a new system to manage data streams for monitoring applications. Monitoring applications differ substantially from conventional business data processing. The fact that a software system must process and react to continual inputs from many sources (e.g., sensors) rather than from human operators requires one to rethink the fundamental architecture of a DBMS for this application area. In this paper, we present Aurora, a new DBMS currently under construction at Brandeis University, Brown University, and M.I.T. We first provide an overview of the basic Aurora model and architecture and then describe in detail a stream-oriented set of operators.

A Review and Taxonomy of Distortion-Oriented Presentation Techniques

by Y. K. Leung, M. D. Apperley , 1994
"... This article provides a taxonomy of distortion-oriented techniques which demonstrates clearly their underly- ng relationships. A unified theory is presented to reveal their roots and origins. Issues relating to the implementation and performance of these techniques are also discussed ..."
Abstract - Cited by 299 (0 self) - Add to MetaCart
This article provides a taxonomy of distortion-oriented techniques which demonstrates clearly their underly- ng relationships. A unified theory is presented to reveal their roots and origins. Issues relating to the implementation and performance of these techniques are also discussed

hierarchical

by Olli Ikkala, A Robin H. A. Ras, A Nikolay Houbenov, Janne Ruokolainen, A Marjo P€a€akk€o, A Janne Laine, C Lars A. Berglund, D Tom Lindstr€om, Gerrit Ten Brinke, F Hermis Iatrou, G Nikos Hadjichristidisg, Charl F. J. Faulh , 2009
"... Solid state nanofibers based on self-assemblies: ..."
Abstract - Add to MetaCart
Solid state nanofibers based on self-assemblies:

Hierarchical Microprocessor Design Using XASM

by M. Anlauff, D. Fischer, P. W. Kutter, J. Teich, R. Weper
"... In this paper, we introduce a tool-supported approach for mixed behavioral and structural simulator generation of complex state-of-the-art microprocessors using Abstract State Machines (ASMs) [5,3]. First, we describe our methodology starting from graphical architecture entry to automatic translatio ..."
Abstract - Add to MetaCart
problems of extensions of ASM languages to support hierarchy and show how XASM's consequent realization of hierarchical ASMs (as introduced in [6]) is able to support hierarchical modeling in the discussed field.

A Scalable Approach to Thread-Level Speculation

by J. Gregory Steffan , Christopher B. Colohan, Antonia Zhai, Todd C. Mowry - IN PROCEEDINGS OF THE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE , 2000
"... While architects understandhow to build cost-effective parallel machines across a wide spectrum of machine sizes (ranging from within a single chip to large-scale servers), the real challenge is how to easily create parallel software to effectively exploit all of this raw performancepotential. One p ..."
Abstract - Cited by 230 (21 self) - Add to MetaCart
While architects understandhow to build cost-effective parallel machines across a wide spectrum of machine sizes (ranging from within a single chip to large-scale servers), the real challenge is how to easily create parallel software to effectively exploit all of this raw performancepotential. One promising technique for overcoming this problem is Thread-Level Speculation (TLS), which enables the compiler to optimistically create parallel threads despite uncertainty as to whether those threads are actually independent. In this paper, we propose and evaluate a design for supporting TLS that seamlessly scales to any machine size because it is a straightforward extension of writeback invalidation-based cache coherence (which itself scales both up and down). Our experimental results demonstrate that our scheme performs well on both single-chip multiprocessors and on larger-scale machines where communication latencies are twenty times larger.

The ASM Refinement Method

by Egon Börger - UNDER CONSIDERATION FOR PUBLICATION IN FORMAL ASPECTS OF COMPUTING
"... In this paper the Abstract State Machine refinement method is presented. Its characteristics compared to other refinement approaches in the literature are explained. Some frequently occurring forms of ASM refinements are identified and illustrated by examples from the design and verification of arch ..."
Abstract - Cited by 55 (13 self) - Add to MetaCart
In this paper the Abstract State Machine refinement method is presented. Its characteristics compared to other refinement approaches in the literature are explained. Some frequently occurring forms of ASM refinements are identified and illustrated by examples from the design and verification
Next 10 →
Results 1 - 10 of 11,528
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University