By Topic

IEEE Transactions on Pattern Analysis and Machine Intelligence

Issue 3 • Date May 1981

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 1981, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (861 KB)
    Freely Available from IEEE
  • List of Contributors

    Publication Year: 1981, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (245 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 1981, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (245 KB)
    Freely Available from IEEE
  • Algorithms for Detecting M-Dimensional Objects in N-Dimensional Spaces

    Publication Year: 1981, Page(s):245 - 256
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2933 KB)

    Exact and approximate algorithms for detecting lines in a two-dimensional image space are discussed. For the case of uniformly distributed noise within an image space, transform methods and different notions of probability measures governing the parameters of the transforms are described. It is shown that different quantization schemes of the transformed space are desirable for different probabili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Pyramidal Representation of Images and Its Feature Extraction Facility

    Publication Year: 1981, Page(s):257 - 264
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2786 KB)

    This paper concerns a pyramidal representation of images. The objective of this study is to represent an image with as small a number of data words as possible in a memory without distorting the feature extraction facility inherent in pyramidal representations. First, a novel scheme for simplifying pyramidal representations is presented. Simplification is essentially based on the reduction of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical Constraint Processes for Shape Analysis

    Publication Year: 1981, Page(s):265 - 277
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3332 KB)

    A major application of syntactic pattern recognition is the analysis of two-dimensional shape. This paper describes a new syntactic shape analysis technique which combines the constraint propagation techniques which have been so successful in computer vision with the syntactic representation techniques which have been successfully applied to a wide variety of shape analysis problems. Shapes are mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Differential Operator Technique for Restoring Degraded Signals and Images

    Publication Year: 1981, Page(s):278 - 284
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2242 KB)

    A technique is described for restoring signals, images, and other physical quantities that have been distorted or degraded by an imperfect measurement system. This technique is based upon the application of a specific differential operator to the measured quantity. For digital implementation, its advantages compared to other restoration techniques are simplicity, computational efficiency, and redu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Derivatives of Tree Sets with Applications to Grammatical Inference

    Publication Year: 1981, Page(s):285 - 293
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2073 KB)

    Tree automata generalize the notion of a finite automaton working on strings to that of a finite automaton operating on trees. Most results for finite automata have been extended to tree automata. In this paper we introduce tree derivatives which extend the concept of Brzozowski's string derivatives. We use tree derivatives for minimizing and characterizing tree automata. Tree derivatives are used... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian and Decision Tree Approaches for Pattern Recognition Including Feature Measurement Costs

    Publication Year: 1981, Page(s):293 - 298
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2534 KB)

    The minimum cost classifier when general cost functions are associated with the tasks of feature measurement and classification is formulated as a decision graph which does not reject class labels at intermediate stages. Noting its complexities, a heuristic procedure to simplify this scheme to a binary decision tree is presented. The optimization of the binary tree in this context is carried out u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Approximation by Variable Knot Bicubic Splines

    Publication Year: 1981, Page(s):299 - 310
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7473 KB)

    This paper presents a degree of freedom or information content analysis of images in the context of digital image processing. As such it represents an attempt to quantify the number of truly independent samples one gathers with imaging devices. The degrees of freedom of a sampled image itself are developed as an approximation problem. Here, bicubic splines with variable knots are employed in an at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three-Dimensional Shape Analysis Using Local Shape Descriptors

    Publication Year: 1981, Page(s):310 - 323
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4178 KB)

    The three-dimensional shape analysis problem is a very demanding test of shape analysis algorithms. Previous approaches to the problem have employed global features such as moments and Fourier descriptors. Global features lack the capacity for solving the partial shape recognition problem, in which only part of the unknown shape is available. Previous approaches to local shape analysis have employ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Three-Dimensional Edge Operator

    Publication Year: 1981, Page(s):324 - 331
    Cited by:  Papers (137)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2564 KB)

    Modern scanning techniques, such as computed tomography, have begun to produce true three-dimensional imagery of internal structures. The first stage in finding structure in these images, like that for standard two-dimensional images, is to evaluate a local edge operator over the image. If an edge segment in two dimensions is modeled as an oriented unit line segment that separates unit squares (i.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Computation of Contour Properties

    Publication Year: 1981, Page(s):331 - 337
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1644 KB)

    Some contour properties can be derived in parallel by a string or cycle of automata in linear time, faster than can be done with a single processor. In particular, the intersection points of two contours, the straightness of a line, the union or intersection of two contours, and polygonal approximations of a contour are computed in linear time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Image Fidelity by Means of the Fidelogram and Level Mean-Square Error

    Publication Year: 1981, Page(s):337 - 347
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7374 KB)

    In the present correspondence a method for the representa-tion of image fidelity is proposed and demonstrated by experimental examples. A fidelity measure is also proposed, which is a formal exten-sion of the commonly utilized mean-square error. The characteristics of these fidelity representations are discussed. As a result, it is shown that the representations proposed here are effective, in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable Indexing Using Unreliable Recognition Devices

    Publication Year: 1981, Page(s):347 - 350
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (874 KB)

    A new method is described and tested for using an unreliable character recognition device to produce a reliable index for a collection of documents. All highly likely substitution errors of the recognition device are handled by transforming characters which confuse readily into the same pseudocharacter. An analysis of the method is done showing the expected precision (fraction of words correctly f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive Pattern Recognition

    Publication Year: 1981, Page(s): 351
    Request permission for commercial reuse | PDF file iconPDF (285 KB)
    Freely Available from IEEE
  • Syntactic Pattern Recognition, An Introduction

    Publication Year: 1981, Page(s):351 - 352
    Request permission for commercial reuse | PDF file iconPDF (586 KB)
    Freely Available from IEEE
  • Structural Pattern Recognition

    Publication Year: 1981, Page(s): 352
    Request permission for commercial reuse | PDF file iconPDF (313 KB)
    Freely Available from IEEE
  • Biomedical Pattern Recognition and Image Processing

    Publication Year: 1981, Page(s): 352
    Request permission for commercial reuse | PDF file iconPDF (313 KB)
    Freely Available from IEEE
  • List of Reviewers

    Publication Year: 1981, Page(s):353 - 354
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 1981, Page(s): 355
    Request permission for commercial reuse | PDF file iconPDF (834 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 1981, Page(s): 356
    Request permission for commercial reuse | PDF file iconPDF (978 KB)
    Freely Available from IEEE
  • List of Contributors

    Publication Year: 1981, Page(s): nil2
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 1981, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1014 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI) is published monthly. Its editorial board strives to present most important research results in areas within TPAMI's scope.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David A. Forsyth
University of Illinois
e-mail: daf@illinois.edu