By Topic

IEEE Transactions on Pattern Analysis and Machine Intelligence

Issue 1 • Date Jan. 1985

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 1985, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (753 KB)
    Freely Available from IEEE
  • List of Contributors

    Publication Year: 1985, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 1985, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • More About Polyhedra-Interpretation Through Constructions in the Image Plane

    Publication Year: 1985, Page(s):1 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2910 KB)

    This paper deals with the interpretation and feasibility check of line drawings representing polyhedral scenes. The polyhedra are of general types and there are no restrictions on camera position. The geometric consistency check and the line labeling are carried out through constructions in the image plane. An algorithm for the geometric construction is suggested, and the necessary conditions for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational Experiments with a Feature Based Stereo Algorithm

    Publication Year: 1985, Page(s):17 - 34
    Cited by:  Papers (174)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (11210 KB)

    Computational models of the human stereo system can provide insight into general information processing constraints that apply to any stereo system, either artificial or biological. In 1977 Marr and Poggio proposed one such computational model, which was characterized as matching certain feature points in difference-of-Gaussian filtered images and using the information obtained by matching coarser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Three-Dimensional Vision by Off-Shelf System with Multi-Cameras

    Publication Year: 1985, Page(s):35 - 45
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4502 KB)

    A three-dimnensional vision system for on-line operation that aids a collision avoidance system for an industrial robot is developed. Because of the real-time requirement, the process that locates and describes the obstacles must be fast. To satisfy the safety requirement, the obstacle model should always contain the physical obstacle entirely. This condition leads to the bounding box description ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Normalization by Complex Moments

    Publication Year: 1985, Page(s):46 - 55
    Cited by:  Papers (54)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3548 KB)

    The role of moments in image normalization and invariant pattern recognition is addressed. The classical idea of the principal axes is analyzed and extended to a more general definition. The relationship between moment-based normalization, moment invariants, and circular harmonics is established. Invariance properties of moments, as opposed to their recognition properties, are identified using a n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Algorithms for Syllable Recognition in Continuous Speech

    Publication Year: 1985, Page(s):56 - 69
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3619 KB)

    A distributed rule-based system for automatic speech recognition is described. Acoustic property extraction and feature hypothesization are performed by the application of sequences of operators. These sequences, called plans, are executed by cooperative expert programs. Experimental results on the automatic segmentation and recognition of phrases, made of connected letters and digits, are describ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Evaluation Based Theorem Prover

    Publication Year: 1985, Page(s):70 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2243 KB)

    A noninductive method for mechanical theorem proving is presented, which deals with a recursive class of theorems involving iterative functions and predicates. The method is based on the symbolic evaluation of the formula to be proved and requires no inductive step. Induction is avoided since a metatheorem is proved which establishes the conditions on the evaluation of any formula which are suffic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A VLSI Systolic Architecture for Pattern Clustering

    Publication Year: 1985, Page(s):80 - 89
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2645 KB)

    Cluster analysis is a valuable tool in exploratory pattern analysis, especially when very little prior information about the data is available. In unsupervised pattern recognition and image segmentation applications, clustering techniques play an important role. The squared-error clustering technique is the most popular one among different clustering techniques. Due to the iterative nature of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Metric for Comparing Relational Descriptions

    Publication Year: 1985, Page(s):90 - 94
    Cited by:  Papers (40)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1026 KB)

    Relational models are frequently used in high-level computer vision. Finding a correspondence between a relational model and an image description is an important operation in the analysis of scenes. In this paper the process of finding the correspondence is formalized by defining a general relational distance measure that computes a numeric distance between any two relational descriptions-a model ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Top-Down Quadtree Traversal Algorithm

    Publication Year: 1985, Page(s):94 - 98
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1214 KB)

    Many standard image processing operations can be implemented using quadtrees as a simple tree traversal where, at each terminal node, a computation is performed involving some of that node's neighbors. Most of this work has involved the use of bottom-up neighbor-finding techniques which search for a nearest common ancestor. Recently, top-down techniques have been proposed which make use of a neigh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fourier Encoding of Closed Planar Boundaries

    Publication Year: 1985, Page(s):98 - 102
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1035 KB)

    A circular Gaussian autoregressive (CGAR) source is used as a model for closed planar curves. A class of suboptimal encoding schemes is considered which separately quantize the Fourier coefficients of the boundary. Application of rate-distortion theoretic techniques leads to parametric equations describing the optimal encoding bound. Interpretation of these equations establishes a sampling criteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Heuristic Search Technique-Algorithm SA

    Publication Year: 1985, Page(s):103 - 107
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (878 KB)

    In this paper, we present a new heuristic searching algorithm by introducing the statistical inference method on the basis of algorithm A (or A*). It is called algorithm SA. In a simplified search space, a uniform m-ary tree, we obtain the following result. Using algorithm SA, a goal node can be found with probability one, and its mean complexity is O(N·ln N) where N is the depth at which the goa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The 2-NN Rule for More Accurate NN Risk Estimation

    Publication Year: 1985, Page(s):107 - 112
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1114 KB)

    By proper design of a nearest-neighbor (NN) rule, it is possible to reduce effects of sample size in NN risk estimation. The 2-NN rule for the two-class problem eliminates the first-order effects of sample size. Since its asymptotic value is exactly half that of the 1-NN rule, it is possible to substitute the 2-NN rule for the 1-NN rule with a resultant increase in accuracy. For further stabilizat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Separating Capacity of a Multithreshold Threshold Element

    Publication Year: 1985, Page(s):112 - 116
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (927 KB)

    In answer to what represents the intrinsic information-processing capability of the pattern classification system, Cover [1] has defined the separating capacity, and has derived it for the linear machine and the so-called ¿ machine. In this paper, the separating capacity of a multithreshold classification element is obtained. It is shown that the capacity of a multithreshold threshold element wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling Memory Overflow in Connected Component Labeling Applications

    Publication Year: 1985, Page(s):116 - 121
    Cited by:  Papers (4)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1257 KB)

    The storage requirements for component labeling and feature extraction operations are unknown a priori. Whenever large images are processed, many labels, and thus a large amount of storage, may be required, making hardware implementation difficult. The proposed labeling procedure eliminates memory overflow by enabling the reuse of memory locations in which features of nonactive labels had been sto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "Digital Step Edges from Zero Crossings of Second Directional Derivatives

    Publication Year: 1985, Page(s):121 - 127
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2949 KB)

    In a recent paper,1 Haralick published an edge detection scheme that was supported, in part, by an evaluation against the Prewitt and the Marr-Hildreth (??2G) operators. This evaluation led to the conclusion that Haralick's method performed the best, and the ??2G operator performed the worst. The implementation of the ??2G operator, on which this evaluation was based, differed significantly from t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author's Reply

    Publication Year: 1985, Page(s):127 - 129
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2630 KB)

    We present evidence that the Laplacian zero-crossing operator does not use neighborhood information as effectively as the second directional derivative edge operator. We show that the use of a Gaussian smoother with standard deviation 5.0 for the Laplacian of a Gaussian edge operator with a neighborhood size of 50 × 50 both misses and misplaces edges on an aerial image of a mobile home park. Cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information for authors

    Publication Year: 1985, Page(s): 130
    Request permission for commercial reuse | PDF file iconPDF (234 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 1985, Page(s):131 - 132
    Request permission for commercial reuse | PDF file iconPDF (268 KB)
    Freely Available from IEEE
  • List of Contributors

    Publication Year: 1985, Page(s): nil2
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 1985, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI) is published monthly. Its editorial board strives to present most important research results in areas within TPAMI's scope.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David A. Forsyth
University of Illinois
e-mail: daf@illinois.edu