Skip to main content

and
Your search also matched 53 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Saliency Detection of Turbid Underwater Images Based on Depth Attention Adversarial Network

Include preview-only content
  1. Chapter and Conference Paper

    AutoLoc: Weakly-Supervised Temporal Action Localization in Untrimmed Videos

    Temporal Action Localization (TAL) in untrimmed video is important for many applications. But it is very expensive to annotate the segment-level ground truth (action class and temporal boundary). This raises t...

    Zheng Shou, Hang Gao, Lei Zhang, Kazuyuki Miyazawa in Computer Vision – ECCV 2018 (2018)

  2. Chapter and Conference Paper

    Online Detection of Action Start in Untrimmed, Streaming Videos

    We aim to tackle a novel task in action detection - Online Detection of Action Start (ODAS) in untrimmed, streaming videos. The goal of ODAS is to detect the start of an action instance, with high categorizati...

    Zheng Shou, Junting Pan, Jonathan Chan, Kazuyuki Miyazawa in Computer Vision – ECCV 2018 (2018)

  3. Chapter and Conference Paper

    Building and Using a Knowledge Graph to Combat Human Trafficking

    There is a huge amount of data spread across the web and stored in databases that we can use to build knowledge graphs. However, exploiting this data to build knowledge graphs is difficult due to the heterogen...

    Pedro Szekely, Craig A. Knoblock, Jason Slepicka in The Semantic Web - ISWC 2015 (2015)

  4. Chapter and Conference Paper

    Discriminative Indexing for Probabilistic Image Patch Priors

    Newly emerged probabilistic image patch priors, such as Expected Patch Log-Likelihood (EPLL), have shown excellent performance on image restoration tasks, especially deconvolution, due to its rich expressivene...

    Yan Wang, Sunghyun Cho, Jue Wang, Shih-Fu Chang in Computer Vision – ECCV 2014 (2014)

  5. Chapter and Conference Paper

    From Low-Cost Depth Sensors to CAD: Cross-Domain 3D Shape Retrieval via Regression Tree Fields

    The recent advances of low-cost and mobile depth sensors dramatically extend the potential of 3D shape retrieval and analysis. While the traditional research of 3D retrieval mainly focused on searching by a ro...

    Yan Wang, Jie Feng, Zhixiang Wu, Jun Wang, Shih-Fu Chang in Computer Vision – ECCV 2014 (2014)

  6. Chapter and Conference Paper

    Recognizing Complex Events in Videos by Learning Key Static-Dynamic Evidences

    Complex events consist of various human interactions with different objects in diverse environments. The evidences needed to recognize events may occur in short time periods with variable lengths and can happe...

    Kuan-Ting Lai, Dong Liu, Ming-Syan Chen, Shih-Fu Chang in Computer Vision – ECCV 2014 (2014)

  7. Chapter and Conference Paper

    Accelerated Large Scale Optimization by Concomitant Hashing

    Traditional locality-sensitive hashing (LSH) techniques aim to tackle the curse of explosive data scale by guaranteeing that similar samples are projected onto proximal hash buckets. Despite the success of LSH...

    Yadong Mu, John Wright, Shih-Fu Chang in Computer Vision – ECCV 2012 (2012)

  8. Chapter and Conference Paper

    Scene Aligned Pooling for Complex Video Recognition

    Real-world videos often contain dynamic backgrounds and evolving people activities, especially for those web videos generated by users in unconstrained scenarios. This paper proposes a new visual representatio...

    Liangliang Cao, Yadong Mu, Apostol Natsev, Shih-Fu Chang in Computer Vision – ECCV 2012 (2012)

  9. Chapter and Conference Paper

    Semantic Concept Classification by Joint Semi-supervised Learning of Feature Subspaces and Support Vector Machines

    The scarcity of labeled training data relative to the high-dimensionality multi-modal features is one of the major obstacles for semantic concept classification of images and videos. Semi-supervised learning l...

    Wei Jiang, Shih-Fu Chang, Tony Jebara, Alexander C. Loui in Computer Vision – ECCV 2008 (2008)

  10. Chapter

    ID-Based Authentication for Mobile Conference Call

    In this paper a secure conference call setu-up protocol is proposed for a mobile communication system. The proposed scheme uses ID-based concept and enables a mobile unit and a base station to authenticate eac...

    Shiuh-Jeng Wang, Le-Pond Chin, **-Fu Chang, Ywh-Ren Tsai in Information Systems Security (1996)

  11. Chapter

    Murine Coronavirus 5′-End Genomic RNA Sequence Reveals Mechanism of Leader-Primed Transcription

    Mouse hepatitis virus (MHV) contains a single-strand, positive-sense RNA genome which is transcribed in infected cells, first, into a full-length negative-strand RNA (Brayton et al., 1982; Lai et al., 1982) an...

    Lisa H. Soe, Chien-Kou Shieh, Shinji Makino, Ming-Fu Chang in Coronaviruses (1987)