2015 IEEE Winter Applications and Computer Vision Workshops

6-9 Jan. 2015

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for reuse | PDF file iconPDF (947 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - vi
    Request permission for reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Message from the General and Program Chairs

    Publication Year: 2015, Page(s):vii - viii
    Request permission for reuse | PDF file iconPDF (73 KB) | HTML iconHTML
    Freely Available from IEEE
  • Activity Recognition Applications from Contextual Video-Text Fusion

    Publication Year: 2015, Page(s):1 - 3
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    In this paper, we propose a demonstration of our capabilities in fusing information extracted from correlated video and text documents. We generate a probabilistic association between entities mentioned in text and detected in video data by jointly optimizing the measure of appearance and behavior similarity. We manage uncertainty that arises from non-overlapping (conflicting) features in the sour... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-objective Detector and Tracker Parameter Optimization via NSGA-II

    Publication Year: 2015, Page(s):4 - 9
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Modern tracking algorithms must engage a wide variety of targets. These targets vary in size, shape, intensity, and speed. While the targets change dependent upon application, oftentimes the tracking software remains predominantly constant. Rather, the tracking algorithm flexibility is achieved by user-defined parameters. Unfortunately even for experienced operators, these parameters may be diffic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Depth Map Generation for Aerial Video in Natural Scenery

    Publication Year: 2015, Page(s):10 - 12
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    In this paper, a novel method to generate depth map automatically from aerial video is proposed. Camera intrinsic and extrinsic parameters are estimated by a traditional Structure from Motion (SfM) approach and a post-processing for the camera path optimized for aerial video is used. Depth map is generated directly from the camera path and 3D point without making meshes in 3D space. Proposed metho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context Exploitation in Intelligence, Surveillance, and Reconnaissance for Detection Algorithms

    Publication Year: 2015, Page(s):13 - 20
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1604 KB) | HTML iconHTML

    Intelligence, Surveillance, and Reconnaissance (ISR) missions involve complex analysis of sensor data that can benefit from the exploitation of geographically aligned context. In this paper we discuss our approach to utilizing geo-registered imagery and context for the purpose of aiding ISR applications. Specifically this includes rendering context masks on imagery, increasing the speed at which d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object Detection in Low Resolution Overhead Imagery

    Publication Year: 2015, Page(s):21 - 27
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1536 KB) | HTML iconHTML

    The proliferation of overhead image sensors has yielded benefits to many applications, including civil transportation, military reconnaissance, and environmental monitoring. Central to these and other applications is the ability to reliably detect and localize rigid man-made objects within large field-of-view images. In this paper we present an automated object detection approach that performs rel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Urban Reconstruction from Wide Area Aerial Surveillance Video

    Publication Year: 2015, Page(s):28 - 35
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    We propose an approach to solve camera pose estimation and dense reconstruction from Wide Area Aerial Surveillance (WAAS) videos captured by an airborne platform hovering around the urban scenes. Our approach solves them in an online fashion: it incrementally updates a sparse 3D model as well as a dense 2.5D Digital Surface Model (DSM) as each new frame arrives; the camera pose of each new frame i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Giraffe Behavior in Thermal Video

    Publication Year: 2015, Page(s):36 - 43
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1108 KB) | HTML iconHTML

    We present a solution for monitoring nocturnal giraffe behavior by reducing several hours of thermal camera surveillance footage into a short video summary which can be reviewed by human analysts. We formulate the video summarization task as a tracking problem: frames in which giraffes are tracked are presumed to be typical poses/behaviors and not included in the summary, whereas frames where trac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolutionary Computational Methods for Optimizing the Classification of Sea Stars in Underwater Images

    Publication Year: 2015, Page(s):44 - 50
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (808 KB) | HTML iconHTML

    Using video and imagery for assessing the distribution and abundance of marine organisms is a valuable sampling method in that it is non-invasive and permits large volumes of data to be acquired. Quickly and accurately processing large volumes of imagery is a challenge for human analysts, which motivates the need for automated processing methods. In this paper, we present a method for the automati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dolphin Detection and Tracking

    Publication Year: 2015, Page(s):51 - 56
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1976 KB) | HTML iconHTML

    Detecting and tracking social marine mammals, including bottlenose dolphins, can help to explain their social dynamics, predict their behavior, and measure the impact of human interference. Multi-camera setups provide an opportunity to record the behavior of captive dolphins and create a massive dataset from which long term statistics can be extracted, but the use of human experts to track dolphin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Detection of Rockfish in Unconstrained Underwater Videos Using Haar Cascades and a New Image Dataset: Labeled Fishes in the Wild

    Publication Year: 2015, Page(s):57 - 62
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    This article presents methods applied for automated detection of fish based on cascade classifiers of Haar-like features created using underwater images from a remotely operated vehicle under ocean survey conditions. The images are unconstrained, and the imaging environment is highly variable due to the moving imaging platform, a complex rocky seabed background, and still and moving cryptic fish t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery of Sets of Mutually Orthogonal Vanishing Points in Videos

    Publication Year: 2015, Page(s):63 - 70
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2247 KB) | HTML iconHTML

    While vanishing point (VP) estimation has received extensive attention, most approaches focus on static images or perform detection and tracking separately. In this paper, we focus on man-made environments and propose a novel method for detecting and tracking groups of mutually orthogonal vanishing points (MOVP), also known as Manhattan frames, jointly from monocular videos. The method is unique i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving Multiple People Tracking in a Minimum Cost Arborescence

    Publication Year: 2015, Page(s):71 - 72
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    For many applications of computer vision, it is necessary to localize and track humans that appear in a video sequence. Multiple people tracking has thus evolved as an ongoing research topic in the computer vision domain. A commonly used approach to solve the data association problem within the tracking task is to apply a hierarchical tracklet framework. Although there has been great progress in s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2015, Page(s): 73
    Request permission for reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2015, Page(s): 74
    Request permission for reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE