By Topic

IEEE Transactions on Pattern Analysis and Machine Intelligence

Issue 12 • Dec 1990

Filter Results

Displaying Results 1 - 12 of 12
  • Links between Markov models and multilayer perceptrons

    Publication Year: 1990, Page(s):1167 - 1178
    Cited by:  Papers (129)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1184 KB)

    The statistical use of a particular classic form of a connectionist system, the multilayer perceptron (MLP), is described in the context of the recognition of continuous speech. A discriminant hidden Markov model (HMM) is defined, and it is shown how a particular MLP with contextual and extra feedback input units can be considered as a general form of such a Markov model. A link between these disc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the localization performance measure and optimal edge detection

    Publication Year: 1990, Page(s):1186 - 1190
    Cited by:  Papers (46)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    The localization performance measure of edge detectors is addressed. A one-dimensional formulation of the problem is considered. A linear space-invariant filter is used for the detection. The locations of local maxima in the thresholded output of the filter are declared to be the edges. The limitations of conventional performance measures are shown, and a localization performance measure for edge ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of fiducials for accurate registration using machine vision

    Publication Year: 1990, Page(s):1196 - 1200
    Cited by:  Papers (47)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    The effect of the shape and size of a standard feature (fiducial) on the positional accuracy of the centroid in machine-vision applications is studied. It is shown that a circular fiducial provides superior subpixel registration accuracy among the fiducial shapes typically used today View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Polynomial methods for structure from motion

    Publication Year: 1990, Page(s):1150 - 1166
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1448 KB)

    The authors analyze the limitations of structure from motion (SFM) methods presented in the literature and propose the use of a polynomial system of equations, with the unit quaternions representing rotation, to recover SFM under perspective projection. The authors combine the equations by the method of resultants with the MAXIMA symbolic algebra system, reducing the system to a single polynomial.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An error analysis for surface orientation from vanishing points

    Publication Year: 1990, Page(s):1179 - 1185
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    Given two parallel lines in a plane, their images formed by central projection onto the viewing plane intersect at a vanishing point, which provides a constraint on the orientation of the plane. Two such independent constraints define a vanishing line and thereby determine the orientation of the plane uniquely. In order to effectively use this information, an estimate of its accuracy must be incor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic representation of binary images

    Publication Year: 1990, Page(s):1190 - 1196
    Cited by:  Papers (30)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    A method of representing black and white images through the description of the boundaries of the objects that define such images is proposed. In order to obtain such a representation, this method uses several algorithms which perform boundary extraction, contour following, segmentation, pattern classification, and curve fitting. One of the advantages of this method is that the image can be reconst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stereo ranging with verging cameras

    Publication Year: 1990, Page(s):1200 - 1205
    Cited by:  Papers (22)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    A method of computing absolute range from stereo disparities by using verging cameras is presented. The approach differs from others by concentrating, through both analysis and experiment, on the effects caused by convergence, rather than on the general camera calibration problem. To compute stereo disparities, linear image features are extracted and matched using a hypothesize-and-verify method. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On recognizing and positioning curved 3-D objects from image contours

    Publication Year: 1990, Page(s):1127 - 1137
    Cited by:  Papers (120)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1032 KB)

    An approach for explicitly relating the shape of image contours to models of curved three-dimensional objects is presented. This relationship is used for object recognition and positioning. Object models consist of collections of parametric surface patches and their intersection curves; this includes nearly all representations used in computer-aided geometric design and computer vision. The image ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonlinear multiresolution: a shape-from-shading example

    Publication Year: 1990, Page(s):1206 - 1210
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    A method for image resolution reduction that simulates the reduction of shape resolution and is to be used with shape-from-shading algorithms is presented. Resolution reduction is used for accelerating shape-from-shading algorithms using multiresolution pyramids. The goal of this correspondence is to show that resolution reduction based only on image intensities can be inferior to resolution reduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matching aerial images to 3-D terrain maps

    Publication Year: 1990, Page(s):1138 - 1149
    Cited by:  Papers (45)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1156 KB)

    A terrain-matching algorithm is presented for use in a passive aircraft navigation system. A sequence of aerial images is matched to a reference digital map of the 3-D terrain. Stereo analysis of successive images results in a recovered elevation map. A cliff map is then used as a novel compact representation of the 3-D surfaces. The position and heading of the aircraft are determined with a terra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new set of constraint-free character recognition grammars

    Publication Year: 1990, Page(s):1210 - 1217
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    A general pattern-recognition procedure for application to unconstrained alphanumeric characters is presented. The procedure is designed to allow hierarchical redescription of the input images in terms of significant elements only, and formal developments are given within the framework of elementary phrase-structure grammars. The extraction of the primitives associated with the terminal vocabulari... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer-access security systems using keystroke dynamics

    Publication Year: 1990, Page(s):1217 - 1222
    Cited by:  Papers (101)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    An approach to securing access to computer systems is described. By performing real-time measurements of the time durations between the keystrokes when a password is entered and using pattern-recognition algorithms, three online recognition systems were devised and tested. Two types of passwords were considered: phrases and individual names. A fixed phrase was used in the identification system. In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI) is published monthly. Its editorial board strives to present most important research results in areas within TPAMI's scope.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David A. Forsyth
University of Illinois
e-mail: daf@illinois.edu