By Topic

IEEE Transactions on Pattern Analysis and Machine Intelligence

Issue 4 • Date April 2009

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • A Closed-Form Expression of the Positional Uncertainty for 3D Point Clouds

    Publication Year: 2009, Page(s):577 - 590
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2793 KB) | HTML iconHTML

    We present a novel closed-form expression of positional uncertainty measured by a near-monostatic and time-of-flight laser range finder with consideration of its measurement uncertainties. An explicit form of the angular variance of the estimated surface normal vector is also derived. This expression is useful for the precise estimation of the surface normal vector and the outlier detection for fi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Visual Search of Videos Cast as Text Retrieval

    Publication Year: 2009, Page(s):591 - 606
    Cited by:  Papers (63)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6160 KB) | HTML iconHTML

    We describe an approach to object retrieval which searches for and localizes all the occurrences of an object in a video, given a query image of the object. The object is represented by a set of viewpoint invariant region descriptors so that recognition can proceed successfully despite changes in viewpoint, illumination and partial occlusion. The temporal continuity of the video within a shot is u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Head Pose Estimation in Computer Vision: A Survey

    Publication Year: 2009, Page(s):607 - 626
    Cited by:  Papers (257)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8176 KB) | HTML iconHTML

    The capacity to estimate the head pose of another person is a common human ability that presents a unique challenge for computer vision systems. Compared to face detection and recognition, which have been the primary foci of face-related vision research, identity-invariant head pose estimation has fewer rigorously evaluated systems or generic solutions. In this paper, we discuss the inherent diffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Zernike Moments Comparison for Optimal Similarity and Rotation Angle Retrieval

    Publication Year: 2009, Page(s):627 - 636
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2209 KB) | HTML iconHTML

    Zernike moments constitute a powerful shape descriptor in terms of robustness and description capability. However the classical way of comparing two Zernike descriptors only takes into account the magnitude of the moments and loses the phase information. The novelty of our approach is to take advantage of the phase information in the comparison process while still preserving the invariance to rota... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Characterizations of Simple Points in 2D, 3D, and 4D Discrete Spaces

    Publication Year: 2009, Page(s):637 - 648
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1274 KB) | HTML iconHTML

    A point of a discrete object is called simple if it can be deleted from this object without altering topology. In this article, we present new characterizations of simple points which hold in dimensions 2, 3 and 4, and which lead to efficient algorithms for detecting such points. In order to prove these characterizations, we establish two confluence properties of the collapse operation which hold ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm

    Publication Year: 2009, Page(s):649 - 660
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (910 KB) | HTML iconHTML

    We present an analysis and algorithm for the problem of super-resolution imaging, that is the reconstruction of HR (high-resolution) images from a sequence of LR (low-resolution) images. Super-resolution reconstruction entails solutions to two problems. One is the alignment of image frames. The other is the reconstruction of a HR image from multiple aligned LR images. Both are important for the pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Segmentation According to Natural Examples: Learning Static Segmentation from Motion Segmentation

    Publication Year: 2009, Page(s):661 - 676
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2387 KB) | HTML iconHTML

    The segmentation according to natural examples (SANE) algorithm learns to segment objects in static images from video training data. SANE uses background subtraction to find the segmentation of moving objects in videos. This provides object segmentation information for each video frame. The collection of frames and segmentations forms a training set that SANE uses to learn the image and shape prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking by an Optimal Sequence of Linear Predictors

    Publication Year: 2009, Page(s):677 - 692
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3717 KB) | HTML iconHTML Multimedia Media

    We propose a learning approach to tracking explicitly minimizing the computational complexity of the tracking process subject to user-defined probability of failure (loss-of-lock) and precision. The tracker is formed by a Number of Sequences of Learned Linear Predictors (NoSLLiP). Robustness of NoSLLiP is achieved by modeling the object as a collection of local motion predictors - object motion is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Multiscale Subbands of Photographic Images with Fields of Gaussian Scale Mixtures

    Publication Year: 2009, Page(s):693 - 706
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5833 KB) | HTML iconHTML

    The local statistical properties of photographic images, when represented in a multi-scale basis, have been described using Gaussian scale mixtures. Here, we use this local description as a substrate for constructing a global field of Gaussian scale mixtures (FoGSM). Specifically, we model multi-scale subbands as a product of an exponentiated homogeneous Gaussian Markov random field (hGMRF) and a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilevel Training of Binary Morphological Operators

    Publication Year: 2009, Page(s):707 - 720
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6999 KB) | HTML iconHTML

    The design of binary morphological operators that are translation-invariant and locally defined by a finite neighborhood window corresponds to the problem of designing Boolean functions. As in any supervised classification problem, morphological operators designed from training sample also suffer from overfitting. Large neighborhood tends to lead to performance degradation of the designed operator... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supervised and Traditional Term Weighting Methods for Automatic Text Categorization

    Publication Year: 2009, Page(s):721 - 735
    Cited by:  Papers (69)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2545 KB) | HTML iconHTML

    In vector space model (VSM), text representation is the task of transforming the content of a textual document into a vector in the term space so that the document could be recognized and classified by a computer or a classifier. Different terms (i.e. words, phrases, or any other indexing units used to identify the contents of a text) have different importance in a text. The term weighting methods... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Edit-Distance Model for the Approximate Matching of Timed Strings

    Publication Year: 2009, Page(s):736 - 741
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    An edit-distance model that can be used for the approximate matching of contiguous and noncontiguous timed strings is presented. The model extends the concept of the weighted string-edit distance by introducing timed edit operations and by making the edit costs time dependent. Special attention is paid to the timed null symbols that are associated with the timed insertions and deletions. The usefu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Spatial Distribution of Fingerprint Singularities

    Publication Year: 2009, Page(s):742 - 448
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2635 KB) | HTML iconHTML Multimedia Media

    Fingerprint singularities play an important role in several fingerprint recognition and classification systems. Although some general relationships and constraints about the location of singularities in the different fingerprint classes are well known, to the best of our knowledge no statistical models have been developed until now. This paper studies the spatial distributions of singularity locat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian Nonlinear Principal Component Analysis Using Random Fields

    Publication Year: 2009, Page(s):749 - 754
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (787 KB) | HTML iconHTML

    We propose a novel model for nonlinear dimension reduction motivated by the probabilistic formulation of principal component analysis. Nonlinearity is achieved by specifying different transformation matrices at different locations of the latent space and smoothing the transformation using a Markov random field type prior. The computation is made feasible by the recent advances in sampling from von... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonparametric Discriminant Analysis for Face Recognition

    Publication Year: 2009, Page(s):755 - 761
    Cited by:  Papers (46)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1562 KB) | HTML iconHTML

    In this paper, we develop a new framework for face recognition based on nonparametric discriminant analysis (NDA) and multi-classifier integration. Traditional LDA-based methods suffer a fundamental limitation originating from the parametric nature of scatter matrices, which are based on the Gaussian distribution assumption. The performance of these methods notably degrades when the actual distrib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comment: Projection Methods Require Black Border Removal

    Publication Year: 2009, Page(s): 762
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (41 KB) | HTML iconHTML

    A persistent flaw in the evaluation of page segmentation algorithms is examined. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Response to "Projection Methods Require Black Border Removal"

    Publication Year: 2009, Page(s):763 - 764
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    In contrast to prior experimental work, our results support the conclusion that RXYC can perform well after marginal noise removal. However, marginal noise removal on page images like those found in UW3 remains a hard problem, and it therefore remains an open question whether RXYC can actually achieve competitive performance on such databases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society 2009 Membership Application

    Publication Year: 2009, Page(s):765 - 767
    Request permission for commercial reuse | PDF file iconPDF (226 KB)
    Freely Available from IEEE
  • IEEE Computer Society Career Center

    Publication Year: 2009, Page(s): 768
    Request permission for commercial reuse | PDF file iconPDF (308 KB)
    Freely Available from IEEE
  • TPAMI Information for authors

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI) is published monthly. Its editorial board strives to present most important research results in areas within TPAMI's scope.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David A. Forsyth
University of Illinois
e-mail: daf@illinois.edu