How To Write A Compact Video Description For Copy Detection With Precise Alignment
|
|
|
- Samson Austin
- 5 years ago
- Views:
Transcription
1 Compact Video Description for Copy Detection with Precise Temporal Alignment Matthijs Douze, Hervé Jégou, Cordelia Schmid, Patrick Pérez To cite this version: Matthijs Douze, Hervé Jégou, Cordelia Schmid, Patrick Pérez. Compact Video Description for Copy Detection with Precise Temporal Alignment. Kostas Daniilidis and Petros Maragos and Nikos Paragios. ECCV European Conference on Computer Vision, Sep 2010, Heraklion, Greece. Springer-Verlag, 6311, pp , 2010, Lecture Notes in Computer Science. < < / >. <inria v3> HAL Id: inria Submitted on 22 Mar 2011 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
2 Compact video description for copy detection with precise temporal alignment Matthijs Douze 1, Hervé Jégou 2, Cordelia Schmid 1, and Patrick Pérez 3 1 INRIA Grenoble, France 2 INRIA Rennes, France 3 Technicolor Rennes, France Abstract. This paper introduces a very compact yet discriminative video description, which allows example-based search in a large number of frames corresponding to thousands of hours of video. Our description extracts one descriptor per indexed video frame by aggregating a set of local descriptors. These frame descriptors are encoded using a time-aware hierarchical indexing structure. A modified temporal Hough voting scheme is used to rank the retrieved database videos and estimate segments in them that match the query. If we use a dense temporal description of the videos, matched video segments are localized with excellent precision. Experimental results on the Trecvid 2008 copy detection task and a set of videos from YouTube show that our method offers an excellent trade-off between search accuracy, efficiency and memory usage. 1 Introduction We consider the problem of searching a transformed query video, or part of this query, in a large database of videos. This is important, in particular, for detecting video copies that may be illegally delivered on peerto-peer networks and user generated content sites such as YouTube. The most common transformations observed in practice are camcording and re-encoding, though sophisticated video post-processing is also encountered. In recent evaluations [1, 2], the use of local descriptors [3 6] combined with a frame voting system appeared to be the most successful architecture for video copy detection. These state-of-the-art systems search individually for each local descriptor of the query video in a structure indexing all local descriptors of the video database. The typical memory requirement associated with representing the set of local descriptors of a video frame ranges from 1 to 10 Kbytes. This seriously limits the number of video frames that can be indexed in practice. Therefore, the video frames are subsampled, which reduces the capability to find very
3 2 Douze, Jégou, Schmid & Pérez segment description generation of compact refining codes time-aware indexing structure database video k-nearest neighbors for each frame local descriptor extraction aggregation + dimensionality reduction query video query (frame based) improved Hough transform: scoring and alignment Fig. 1. Overview of our video copy detection method. Local descriptors of a video frame are aggregated into a single vector and the dimension of this vector is reduced. The videos to be indexed are encoded using a temporal-aware indexing scheme. No encoding is applied to the query frame descriptors. A weighted temporal Hough transform provides the final ranking of the database videos w.r.t. the query. short clips and to determine the precise localization of the query in the database videos. Furthermore, even with subsampling, very large video datasets (several thousands hours of videos) cannot be handled efficiently. The objective of this paper is to address these scalability and localization issues, while maintaining a high recognition rate. Figure 1 gives an overview of our approach for querying and matching video segments. The individual steps are: 1. Local descriptors are extracted from video frames (either query or database video) and subsequently aggregated into a single vector. This aggregation process is similar to recent approaches for descriptor aggregation [7, 8] which outperform the popular bag-of-features (BOF) representation [9] with descriptors of lower dimension. 2. The dimensionality of this frame descriptor is reduced with either a technique based on a multiplication with a sparse matrix or principal component analysis (PCA). 3. On the database side, the reduced descriptors are encoded within an indexing structure that takes into account the temporal regularity. The video is split in segments. A first description is computed for a segment by minimizing a fidelity criterion for frames of this segment. In the spirit of [10], this segment descriptor is refined by a code based on a product quantizer. 4. Each frame s approximate description is refined by encoding the difference between the frame descriptor and the vector describing the segment it belongs to. 5. A modified temporal Hough voting scheme is used to fuse the votes obtained at the frame level. Its main difference with the conventional
4 Compact video description with precise temporal alignment 3 method is that the votes are weighted so that their contribution is penalized if 1) the query frame has received a large amount of votes and 2) the database frame has voted several times. The paper is organized as follows. The frame description method is introduced in Section 2. Section 3 describes how frame descriptors are indexed and retrieved when a query frame descriptor is submitted. The voting scheme is presented in Section 4. The contributions of the different steps are evaluated in Section 5. Furthermore, we compare to the state of the art on the Trecvid 2008 benchmark, and obtain top results in terms of localization accuracy. The scalability of the approach is demonstrated by experiments on YouTube videos represented by more than 200 million frames. We show that these videos are indexed in less than 5GB of memory. 2 Video description 2.1 Local description The first step of our video description extracts a set of local features for each frame. The same approach is used to extract descriptors for the query and database videos. Here, regions are obtained with the scale-invariant Hessian detector [11] and described by CSLBP [12]. Similar to SURF [13] and DAISY [14], this descriptor is a variant of the SIFT descriptor which provides comparable results and reduces the computation time significantly: extracting local descriptors from a frame takes about 35 ms on one 2.4GHz processor core. Note that for large databases, the time for feature extraction is not the critical operation at query time, because it only depends on the query length, not the database size. 2.2 Local descriptor aggregation: non probabilistic Fisher Kernel Given a set of local descriptors {x 1,..., x i,... } for each video frame, it is impossible to store all of them in memory in the case of large scale video search, even if only a few bytes are required for each of them [15, 16]. In general, several hundreds of local descriptors are extracted for each frame. We, therefore, aggregate the local descriptors into a single vector. We adopt a variant [8] of the Fisher Kernel image representation introduced by Perronnin et al. [7]. The resulting vector, called vector of locally
5 4 Douze, Jégou, Schmid & Pérez aggregated descriptors (VLAD), provides a compact yet effective representation of images. Assuming that a k-means codebook with k centroids {c 1,..., c j,..., c k } has been learned, we obtain the VLAD descriptor for a frame, denoted by µ, as follows: 1. As for the bag-of-features representation, each local descriptor x i of the frame is assigned to the closest centroid in the codebook, i.e., to the quantization index NN(x i ) = arg min j x i c j. 2. Given the set of descriptors assigned to a centroid c j, the vector µ j is obtained by summing the differences between these descriptors and the centroid: µ j = x i c j. (1) i:nn(x i )=j 3. The VLAD descriptor associated with a frame is obtained by concatenating the vectors µ j into a single vector. 4. As proposed in [17] for the Fisher Kernel image representation, we apply a power-law normalization to the components to reduce the contribution of the most energetic ones. Here, we use the signed square root of each component. The vector is subsequently L2-normalized and is denoted µ in the following. The resulting vector is of dimension k times the dimensionality of the input vector, e.g., k 128 for the CSLBP descriptor. For the same codebook size, the dimensionality of the descriptor is significantly larger than for the bag-of-features representation [9]. However, the VLAD description is already discriminant for low values of k in contrast to BOF, which requires very large codebooks (up to 1 million) to provide the best results [18, 19]. Therefore, the dimensionality of the VLAD vector is typically lower than for BOF. It is worth noting that this representation can be seen as a non-probabilistic version of the Fisher kernel. In the latter, a Gaussian mixture model and soft assignment are used instead of k-means centroids, and additional information (variance and count) are used to obtain a richer (but longer) representation. 2.3 Dimensionality reduction of frame descriptors Local descriptor aggregation results in one VLAD descriptor per video frame. This descriptor is highly dimensional: for a typical value of k = 64, the vector µ has D = 128 k = 8192 components. Such a vector is difficult to index due to its dimensionality [8]. We, therefore, use and compare two different methods to reduce the dimensionality:
6 Compact video description with precise temporal alignment 5 1. Principal component analysis (PCA) allows to reduce the dimension D of the VLAD descriptor to a smaller dimension d [8]. The vector µ is multiplied with a projection matrix M formed by the first principal eigenvectors of an empirical covariance matrix. The PCA matrix is pre-multiplied with a random rotation to whiten the output; 2. Alternatively, we define M as a d D sparse matrix obtained as M = P σ, where σ is a D D random permutation matrix and P is a d D aggregation matrix that sums several consecutive components. For example with D = 6 and d = 2, a possible matrix M is: [ ] [ ] = (2) } {{ } M } {{ } P } {{ } σ The two techniques are evaluated in Section 5. The advantage of using a structured matrix is that there is no need for a training stage. The dimensionality reduction is also cheaper to compute, because the multiplication is more efficient with the sparse matrix M than with the full matrix obtained by PCA. However, during the search, the dimensionality reduction typically has a low computing cost compared to the other steps. The descriptor f R d of reduced dimensionality is obtained by multiplying the matrix M with the VLAD descriptor µ and by L2-normalizing it. The resulting vector f is used in the following as the frame descriptor. The dot product is used as a similarity measure. 3 Indexing frame descriptors with temporal integration The objective of this section is to provide a compact representation and an efficient search mechanism for the frames of a database video. Let us consider a video to be indexed 4, for which we have extracted a set f 1,..., f t,..., f T of d-dimensional descriptors using the method introduced in Section 2. The individual descriptors will be approximated, indexed and searched using three successive refinement levels: 1. joint description of a group of contiguous frames: all the frames associated with the same time segment have the same coarse approximation; 4 We treat several videos as a single long video, except that we constrain a segment of frames not to cross video boundaries.
7 6 Douze, Je gou, Schmid & Pe rez Fig. 2. Hierarchical representation of the frame descriptors. At levels 1 and 2, segments are represented by a frame descriptor. At level 1, the descriptor is quantized to a single index, that is refined at Level 2 by a product quantizer code. At level 3, the individual frames of the segment are represented as a refinement of their segment descriptor. Typically, a segment descriptor is encoded in 4+64 bytes, while each frame is refined by a 16-byte code. 2. refinement of this video segment descriptor; 3. refinement of the individual frame descriptors. Each of these levels provides an improved approximation of an indexed frame descriptor, as illustrated by Figure 2. This procedure is not used for the frames of the query, i.e., their VLAD descriptors are not approximated. Our approach is, to some extent, similar in spirit to the method proposed in [10]. However, a major difference is the integration of the temporal aspect into the indexing scheme. 3.1 Level 1: Coarse segment description Due to the temporal dependency between frames, contiguous frame descriptors of a video shot are similar. We exploit this property by providing a shared description for consecutive frames. Let us define a segment {tb,..., te } as an interval of consecutive frames, for which the same level 1+2 approximation of the descriptor is used. If segments are of fixed size, we have te = tb + 1/r 1, where r is the ratio between the number of segments and the total number of frames in the video. The first approximation is given by a coarse vector quantizer qc (.), for which the codebook Cc = {c1,..., cl } is learned using a spherical k-means algorithm. The coarse quantization index ic (tb : te ) associated with the segment {tb,..., te } aims at best representing the set of frame descriptors {ftb,..., fte } with respect to the total square error, i.e., X ic (tb : te ) = arg min ft ci 2, (3) i Cc t=tb :te
8 Compact video description with precise temporal alignment 7 which is equivalent to ( c ic(tb :t e) = q c r ) t=t b :t e f t (4) The vector c ic(t b :t e) is the level-1 approximation of the frame descriptors in the segment {t b,..., t e }. When searching the nearest neighbors of a given query descriptor, only the database descriptors associated with the k c closest elements in C c are explored. We have tested both a fixed and adaptive number of frames per segment. Several variants for selecting keyframes have been tested in the adaptive case. Best results were obtained when constructing the segments based on the consistency of the k-nearest neighbors in C c for the frame descriptors. However, experimental results showed that no variant is better than uniform subsampling. We, therefore, only use segments of fixed size in the following. 3.2 Level 2: segment descriptor refinement The index associated with a given video segment is not precise, as an approximation with a centroid in C c introduces a large quantization error. Therefore, similar to [10], we refine this first approximation by using a product quantizer q f, whose codebook 5 is denoted by C f. The total number of centroids implicitly defined by a product quantizer composed of m f subquantizers having L f centroids each is equal to (L f ) m f. This quantizer aims at reducing, over the set of frames associated with a given segment, the average energy of the error vector f t c ic(t b :t e) made by the first approximation q c (f t ) = c ic(t b :t e). The new approximation of a frame descriptor f t associated with the segment {t b,..., t e } is, therefore, of the form f t c ic(t b :t e) + c i f (t b :t e), (5) where the centroid c i f (t b :t e) C f is obtained by the minimization c i f (t b :t e) = arg min c i C f t=t b :t e f t c ic(t b :t e) c i 2. (6) 5 A product quantizer decomposes the space into a Cartesian product of low dimensional subspaces and quantizes each space separately. As a result, learning codebooks and searching the quantization index have a low complexity even for very large codebooks. The codebook C f has not to be stored explicitly.
9 8 Douze, Jégou, Schmid & Pérez The minimization is efficiently done using the decomposition associated with the product quantizer. Note that this quantizer q f is more precise than the coarse quantizer used in the first stage, because the set of centroids C f that is implicitly defined by the product quantizer is large: it is for the typical 64-byte codes we use (m f = 64, L f = 256). The product quantizer decomposition is used to obtain a complexity comparable to that of a quantizer comprising L f elements. 3.3 Level 3: refinement of individual frame descriptors So far, the frames of a segment are described by the same approximation. We now refine the description of each individual frame f t by using another refinement product quantizer q r induced by m r subquantizers with L r centroids each. This quantizer encodes the error resulting from the two previous approximations by minimizing the quantization error of f t. For a time instant t such that t {t b,..., t e }, this is done by quantizing the residual error vector f t c ic(t b :t e) c i f (t b :t e). The frame descriptor f t is therefore approximated by ˆf t = c ic(tb :t e) + c i f (t b :t + q e) r(f t c ic(tb :t e) c i f (t b :t e) ). (7) 3.4 Search procedure Searching a query frame vector y in a database of frame descriptors B = {f 1,..., f T } proceeds in a hierarchical manner. 1. The k c nearest neighbors of y in C c identify the segments to be considered: only those associated with one of the selected k c indexes are explored. 2. For each vector f i in the set of selected lists, the distance approximation l 2 (f i, y) = l 2 (f i q c (f i ), y q c (f i )) l 2 (q f (f i q c (f i )), y q c (f i )) (8) is efficiently obtained from the quantizer indexes q f (f i q c (f i )) by exploiting ADC method of [10]. The best segments corresponding to a query vector are found based on the approximation of the square distance of Equation 8. This step returns the set of the k f nearest segment descriptors. 3. The query frame descriptor y is now compared to all the approximated ˆf t frame descriptors associated with the k f segments found in the previous stage. This step returns a set of k r nearest frame descriptors.
10 Compact video description with precise temporal alignment Complexity The cost of searching a frame descriptor in a database containing T frames is expressed in terms of the number C dist of regular d-dimensional vector comparisons and the amount C mem of memory scanned in the indexing structure. These are given by C dist = L + k c L f + k f r (9) and C mem = α k c L r T m f log 2 L f + k f r m r log 2 L r, (10) where log 2 L f = log 2 L r = 8 bits = 1 byte in our case. The factor α 1 accounts for the fact that the probability to assign a frame descriptor to an index is not uniform over C c. As observed in [18] in the context of the BOF representation, this increases the expectation of the number of elements that are processed. We measured that α 8.4 with our parameters. Note that our calculation of C dist assumes that the level-2 search is optimized by using look-up tables computed on-the-fly. 4 Temporal alignment: improved Hough transform Once each query frame has been matched to k r putative frames of the database, the video search matches a sequence of query descriptors to sequence(s) from the database. This sequence matching can be cast in terms of temporal sequence alignment and addressed by dynamic programming techniques, such as dynamic time warping. However, this type of approaches requires a complete frame-to-frame matching cost matrix, which is not feasible at this stage of the detection system. Furthermore, they require a good initialization of the starting and endpoint of the matching sequences. Simplified approaches can be used instead, e.g., partial alignment [20] or classic voting techniques, such as Hough transform or RANSAC. We adopt a temporal Hough transform [6], as it allows the efficient estimation of 1D temporal shifts. Individual frame votes are re-weighted according to suitable normalizations. In particular, re-weighting is used to reduce the harmful influence of temporal burstiness, i.e., the presence of query frames that match strongly with multiple, possibly unrelated frames in the database. This is similar to the burstiness of local descriptors in images [21].
11 10 Douze, Jégou, Schmid & Pérez 4.1 Hough transform As output of the indexing structure, we have a set of matches, each of them represented by a score s(τ, t) > 0 between the query frame timestamp τ and the database timestamp t. This score is given by the inner product between the query frame descriptor and the approximation of the database descriptor in Equation 7. We set to 0 the scores of frames that are not matched: { yτ, s(τ, t) = ˆf t if t is retrieved by the index 0 otherwise. (11) The temporal Hough transform consists in computing a histogram h(δ) to accumulate these scores for all δ = t τ hypotheses. Denoting by Y and B = {1,..., T } the sets of time instants on the query side and the database side, respectively, the score is formally obtained as h(δ) = τ Y s(τ, τ + δ), (12) where s(τ, t) = 0 if t / B. Peaks (maximum values) are then searched in the histogram h. We typically select 100 peaks and then apply non maximum suppression, i.e., peaks that are closer than 1 minute to a stronger one are discarded. For each peak identified by δ, the boundaries of the matching segments are then identified by collecting all the matches (τ, t) associated with a hypothesis δ such that τ t δ < 10. The final score is the sum of scores of these matches. 4.2 Handling the temporal burstiness As mentioned in Section 3, consecutive video frames are often very similar, and so are their descriptors. This temporal dependency biases the scores returned by the Hough histogram, as bursts of votes occur for some frames, both on the query and database. This emphasizes them, i.e., they gather an abnormally large amount of scores. We address this problem by modifying the scoring strategy in a way that mitigates this effect, in the spirit of the re-weighting scheme proposed in [6]. This is done by updating the score, prior to the Hough histogram computation in two steps: s 1 (τ, t) = s(τ, t)/ s(τ, t) and s 2 (τ, t) = s 1 (τ, t)/ s 1 (τ, t), τ Y t B (13)
12 Compact video description with precise temporal alignment 11 where the computation is done efficiently by considering only the non-zero score values in the summations. The updated score s 2 is used instead of the original scores in Equation 12. We will show in Section 5 that this procedure significantly improves the quality of the Hough estimation. 5 Experiments 5.1 Datasets and evaluation protocol Trecvid 08. This dataset contains 200 hours of Dutch television broadcasts. It was used for the copy detection pilot task in the Trecvid 08 evaluation campaign. A set of 134 query clips was extracted from the dataset and 67 clips from other videos were added as negatives, i.e., with no corresponding videos in the database. Some clips were embedded in a distractor video and all were then transformed with 10 different transformations, see Table 2. As a result, 2010 queries with varying degrees of difficulty are used to evaluate a system. The performance measure used to evaluate the search quality in the Trecvid competition is the Normalized Detection Cost Ratio (NDCR), which integrates the cost of missing a true positive with the cost of retrieving an incorrect video. It is equal to 0 if all the true positives are returned before the false positives (no matter how many there are) and lower values of the NDCR correspond to better results. A result video segment is considered as a true positive if it overlaps with the ground-truth. We have used this measure 6 to compare our results with those obtained by the participants of the Trecvid 08 evaluation, see Subsection 5.3. STV (Small Trecvid). In order to evaluate the parameters of our approach, we created a reduced version of the Trecvid dataset, referred to in the following as STV. It uses a subset of 21 h of the videos. From these videos we extracted a set of 100 clips not used by in the Trecvid 08 queries, embedded them in an independent distractor set and transformed them with some of the most challenging transformations. This dataset is smaller than the Trecvid 08 dataset. However, the transformations are more challenging on average. We, therefore, obtain comparable conclusions with reduced runtime. Furthermore, using this dataset for parameter evaluation avoids optimizing parameters on the Trecvid query set, and provides a fair comparison with the state of the art on this dataset. 6 NIST (the institute organizing Trecvid) provided the software to compute this measure as well as the results of the other participants.
13 12 Douze, Jégou, Schmid & Pérez YouTube. In order to evaluate the scalability of our system, we have collected a dataset of YouTube videos. We downloaded a total of 38,000 videos from YouTube, corresponding to 189 million frames (or 2100 h). Most of the videos have a similar resolution as the Trecvid ones (about 352*288) and the number of interest points extracted per frame is similar (about 300 per frame on average). These videos are used as distractors in our large scale experiment in Section 5.4. Evaluation measures. In addition to the NDCR measure used for Trecvid, we have used two additional measures to evaluate performance, localization accuracy and average precision. The localization accuracy for a result segment is measured as the overlap between the ground-truth and the returned result: Ω = T gt T found / T gt T found. If the match is incorrect, Ω = 0, and if the localization of a match is perfect, Ω = 1. Better matches have a higher overlap. We have used the overall Average Precision (AP) as a quality measure. The results returned for all queries are evaluated together ranked by their scores. A match is considered a true positive if the overlap measure is above 0.5. A precision-recall curve evaluates the results as a function of the score. The area under this curve is the AP measure. 5.2 Impact of parameters Unless stated otherwise, for the parameters introduced in Sections 2 and 3, we have used the following values: Descriptor D = 128 k = 8192 d = 2048 r = 1/10 Coarse quantizer L = 2048 k c = 64 Fine quantizer L f = 256 m f = 64 k f = 128 Refinement L r = 256 m r = 16 k r = 32 In the following, we measure the impact of these parameters. The performance is reported for the STV dataset. The dimensionality reduction is evaluated on the two first levels of the method, i.e., without frame grouping (r = 1) nor refinement (Levels 1+2 only). Our aggregation method is compared with PCA to reduce the D = 8192 dimensions of the frame descriptor to d = For this operating point, dimensionality reduction with an aggregator (see Section 2.3) gives AP=87.7, and the PCA-based dimensionality reduction achieves AP=90.1. In the following, we use the PCA-based dimensionality reduction.
14 Compact video description with precise temporal alignment 13 Table 1. Evaluation of memory usage, search accuracy and timings on the STV dataset. The method Levels 1+2, r = 1 indicates that frames are directly considered as segments in our method without any further refinement. The timings are given as a slowdown factor w.r.t. the real video time for one single 2.4GHz processor core (not including the frame description time). structure/algorithm total mem C mem C dist AP time none/brute-force search 62 GB 62 GB 19 M Levels 1+2, r = MB 25 MB Levels 1+2, no refinement 12 MB 2.71 MB Levels (m r = 16) 43 MB 2.73 MB Levels (m r = 32) 73 MB 2.75 MB Levels (m r = 64) 134 MB 2.79 MB Indexing: impact of the quantization and of the refinement step. Table 1 shows the influence of the descriptor quantization and frame grouping on the search accuracy, memory usage and search time. Bruteforce search gives an upper bound on the performance that can be achieved by using our frame descriptor, but is unreasonably expensive. We denote by Levels 1+2 the methods that do not refine the segment level representation on the frame level. If r = 1, then frames are directly considered as segments, while Level 1+2, no refinement has the same effect as a subsampling, except that the average frame descriptor over a segment is used instead of a particular frame of this segment. This variant provides lower search quality, but is interesting to index very large datasets. One can observe that subsampling the video and indexing subsampled frames strongly degrades the performance, by 16 points of AP. The refinement improves the results. Short codes (m r = 16 bytes) are sufficient to capture most of the possible improvement. Note that, for large databases, this last refinement stage (Level 3) is the limiting factor in terms of memory usage, even with the setting m r = 16. Burstiness handling. We have evaluated the impact of our vote regularization procedure which addresses the problem of burstiness (cf. section 4.2). This method significantly improves the results, as shown below: bursts regularization AP none 83.8 database-side (using s 1 in Equation13) 84.3 full regularization (s 2 ) 91.2
15 14 Douze, Jégou, Schmid & Pérez Table 2. Evaluation of our method relative to other Trecvid 08 participants. The score is NDCR (the lower the better). The rank is obtained by taking the best run from each of the 22 participants. no transformation best second ours rank (/23) 1 camcording picture in picture insertion of patterns strong re-encoding change of gamma photometric attacks geometric attacks random transformations from 6/ random transformations from 6/ random transformations Comparison with state of the art Table 2 compares the NDCR scores of our system with the best and second best run (from different participants) of the Trecvid 08 competition 7. We also provide the rank associated with our score. One can see that our system is very competitive, in particular for the most interesting transformations encountered on a peer-to-peer network: camcording and re-encoding. Note that the best score for these transformations is obtained with the approach of [6]. This approach requires 10 GB of RAM against 300 MB used here, i.e., it is difficult to scale to very large video sets. Furthermore, it is more than 5 times slower than the approach presented in this paper (13 real time against 2.47 here on a single computing core). We also compare our localization accuracy with the four best runs (from different participants) of the Trecvid 08 competition. We measure the accuracy on the 195 videos that were correctly retrieved by all 4 runs as well as by our method (i.e. the resulting segment has an overlap with the the ground-truth above 0.5). The measure used is average overlap. The results are: rank of the participant ours mean overlap We can observe that our approach localizes the segments very precisely, i.e., with a better precision than the competing approaches. 7 The competitors can not be identified by name due to the non disclosure agreement of Trecvid.
16 Compact video description with precise temporal alignment Large scale experiment The large scale experiments are performed on the YouTube dataset merged with our STV dataset. Figure 3 shows the AP obtained as the function of the growing database size (up to 2316 hours). When performing the experiments on the whole set, the index requires 4.6 GB of RAM to index 208 million frames. The search is slower on that scale: 23.5 real time for a single processor core. One can observe that the AP measure decreases as to be expected, but that results are still good, i.e., we obtain an AP=0.53 on the entire set. Typical retrieval results of our system are shown in Figure 4. 6 Acknowledgements This work was partly realized as part of the Quaero Programme, funded by OSEO, French State agency for innovation. References 1. P. Over, G. Awad, T. Rose, J. Fiscus, W. Kraaij, and A. Smeaton, Trecvid 2008-goals, tasks, data, evaluation mechanisms and metrics, in Trecvid, J. Law-To, L. Chen, A. Joly, I. Laptev, O. Buisson, V. Gouet-Brunet, N. Boujemaa, and F. Stentiford, Video copy detection: a comparative study, in CIVR. New York, NY, USA: ACM, 2007, pp D. Lowe, Distinctive image features from scale-invariant keypoints, International Journal of Computer Vision, vol. 60, no. 2, pp , K. Mikolajczyk and C. Schmid, A performance evaluation of local descriptors, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 10, pp , A. Joly, New local descriptors based on dissociated dipoles, in CIVR, M. Douze, H. Jégou, and C. Schmid, An image-based approach to video copy detection with spatio-temporal post-filtering, IEEE Transactions on Multimedia, vol. 12, no. 4, pp , jun [Online]. Available: 7. F. Perronnin and C. R. Dance, Fisher kernels on visual vocabularies for image categorization, in CVPR, June H. Jégou, M. Douze, C. Schmid, and P. Pérez, Aggregating local descriptors into a compact image representation, in CVPR, J. Sivic and A. Zisserman, Video Google: A text retrieval approach to object matching in videos, in ICCV, 2003, pp H. Jégou, M. Douze, and C. Schmid, Product quantization for nearest neighbor search, IEEE Transactions on Pattern Analysis and Machine Intelligence, K. Mikolajczyk and C. Schmid, Scale and affine invariant interest point detectors, International Journal of Computer Vision, vol. 60, no. 1, pp , M. Heikkila, M. Pietikainen, and C. Schmid, Description of interest regions with local binary patterns, Pattern Recognition, vol. 42, no. 3, pp , mar 2009.
17 16 Douze, Jégou, Schmid & Pérez 13. H. Bay, A. Ess, T. Tuytelaars, and L. V. Gool, Surf: Speeded up robust features, Computer Vision and Image Understanding, vol. 110, no. 3, pp , S. Winder, G. Hua, and M. Brown, Picking the best Daisy, in CVPR, June V. Chandrasekhar, G. Takacs, D. Chen, S. Tsai, R. Grzeszczuk, and B. Girod, Chog: Compressed histogram of gradients: A low bit-rate feature descriptor, in CVPR, June M. Calonder, V. Lepetit, P. Fua, K. Konolige, J. Bowman, and P. Mihelich, Compact signatures for high-speed interest point description and matching, in ICCV, September F. Perronnin, Y. Liu, J. Sanchez, and H. Poirier, Large-scale image retrieval with compressed Fisher vectors, in CVPR, D. Nistér and H. Stewénius, Scalable recognition with a vocabulary tree, in CVPR, 2006, pp J. Philbin, O. Chum, M. Isard, J. Sivic, and A. Zisserman, Object retrieval with large vocabularies and fast spatial matching, in CVPR, M.-C. Yeh and K.-T. Cheng, Video copy detection by fast sequence matching, in CIVR, H. Jégou, M. Douze, and C. Schmid, On the burstiness of visual elements, in CVPR, June 2009.
18 Compact video description with precise temporal alignment AP database size (hours) Fig. 3. Retrieval performance on the STV dataset combined with a varying number of videos from the remaining Trecvid videos and YouTube. Fig. 4. Example results for video retrieval in our large scale dataset, (left) query and (right) best retrieved video. Lefts pairs: correct retrieval results. Right pairs: incorrect retrieval. Note the visual similarity between the queries and the retrieved videos.
Fast Matching of Binary Features
Fast Matching of Binary Features Marius Muja and David G. Lowe Laboratory for Computational Intelligence University of British Columbia, Vancouver, Canada {mariusm,lowe}@cs.ubc.ca Abstract There has been
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System Céline Franco, Anthony Fleury, Pierre-Yves Guméry, Bruno Diot, Jacques Demongeot, Nicolas Vuillerme To cite this version: Céline Franco,
Mobility management and vertical handover decision making in heterogeneous wireless networks
Mobility management and vertical handover decision making in heterogeneous wireless networks Mariem Zekri To cite this version: Mariem Zekri. Mobility management and vertical handover decision making in
Surgical Tools Recognition and Pupil Segmentation for Cataract Surgical Process Modeling
Surgical Tools Recognition and Pupil Segmentation for Cataract Surgical Process Modeling David Bouget, Florent Lalys, Pierre Jannin To cite this version: David Bouget, Florent Lalys, Pierre Jannin. Surgical
QASM: a Q&A Social Media System Based on Social Semantics
QASM: a Q&A Social Media System Based on Social Semantics Zide Meng, Fabien Gandon, Catherine Faron-Zucker To cite this version: Zide Meng, Fabien Gandon, Catherine Faron-Zucker. QASM: a Q&A Social Media
TouchPaper - An Augmented Reality Application with Cloud-Based Image Recognition Service
TouchPaper - An Augmented Reality Application with Cloud-Based Image Recognition Service Feng Tang, Daniel R. Tretter, Qian Lin HP Laboratories HPL-2012-131R1 Keyword(s): image recognition; cloud service;
Recognition. Sanja Fidler CSC420: Intro to Image Understanding 1 / 28
Recognition Topics that we will try to cover: Indexing for fast retrieval (we still owe this one) History of recognition techniques Object classification Bag-of-words Spatial pyramids Neural Networks Object
Product quantization for nearest neighbor search
Product quantization for nearest neighbor search Hervé Jégou, Matthijs Douze, Cordelia Schmid Abstract This paper introduces a product quantization based approach for approximate nearest neighbor search.
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski.
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Fabienne Comte, Celine Duval, Valentine Genon-Catalot To cite this version: Fabienne
CODING MODE DECISION ALGORITHM FOR BINARY DESCRIPTOR CODING
CODING MODE DECISION ALGORITHM FOR BINARY DESCRIPTOR CODING Pedro Monteiro and João Ascenso Instituto Superior Técnico - Instituto de Telecomunicações ABSTRACT In visual sensor networks, local feature
Cees Snoek. Machine. Humans. Multimedia Archives. Euvision Technologies The Netherlands. University of Amsterdam The Netherlands. Tree.
Visual search: what's next? Cees Snoek University of Amsterdam The Netherlands Euvision Technologies The Netherlands Problem statement US flag Tree Aircraft Humans Dog Smoking Building Basketball Table
3D Model based Object Class Detection in An Arbitrary View
3D Model based Object Class Detection in An Arbitrary View Pingkun Yan, Saad M. Khan, Mubarak Shah School of Electrical Engineering and Computer Science University of Central Florida http://www.eecs.ucf.edu/
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures Serge Chaumette, Jean-Michel Lepine, Franck Rubi To cite this version: Serge Chaumette,
Aggregating local image descriptors into compact codes
Aggregating local image descriptors into compact codes Hervé Jégou, Florent Perronnin, Matthijs Douze, Jorge Sánchez, Patrick Pérez, Cordelia Schmid To cite this version: Hervé Jégou, Florent Perronnin,
Probabilistic Latent Semantic Analysis (plsa)
Probabilistic Latent Semantic Analysis (plsa) SS 2008 Bayesian Networks Multimedia Computing, Universität Augsburg [email protected] www.multimedia-computing.{de,org} References
Aligning subjective tests using a low cost common set
Aligning subjective tests using a low cost common set Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky, Romuald Pépion, Patrick Le Callet To cite this version: Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky,
Online vehicle routing and scheduling with continuous vehicle tracking
Online vehicle routing and scheduling with continuous vehicle tracking Jean Respen, Nicolas Zufferey, Jean-Yves Potvin To cite this version: Jean Respen, Nicolas Zufferey, Jean-Yves Potvin. Online vehicle
Managing Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
Similarity Search in a Very Large Scale Using Hadoop and HBase
http:/cedric.cnam.fr Similarity Search in a Very Large Scale Using Hadoop and HBase Rapport de recherche CEDRIC 2012 http://cedric.cnam.fr Stanislav Barton (CNAM), Vlastislav Dohnal (Masaryk University),
Similarity Search in a Very Large Scale Using Hadoop and HBase
Similarity Search in a Very Large Scale Using Hadoop and HBase Stanislav Barton, Vlastislav Dohnal, Philippe Rigaux LAMSADE - Universite Paris Dauphine, France Internet Memory Foundation, Paris, France
FAST APPROXIMATE NEAREST NEIGHBORS WITH AUTOMATIC ALGORITHM CONFIGURATION
FAST APPROXIMATE NEAREST NEIGHBORS WITH AUTOMATIC ALGORITHM CONFIGURATION Marius Muja, David G. Lowe Computer Science Department, University of British Columbia, Vancouver, B.C., Canada [email protected],
Local features and matching. Image classification & object localization
Overview Instance level search Local features and matching Efficient visual recognition Image classification & object localization Category recognition Image classification: assigning a class label to
A usage coverage based approach for assessing product family design
A usage coverage based approach for assessing product family design Jiliang Wang To cite this version: Jiliang Wang. A usage coverage based approach for assessing product family design. Other. Ecole Centrale
Distributed High-Dimensional Index Creation using Hadoop, HDFS and C++
Distributed High-Dimensional Index Creation using Hadoop, HDFS and C++ Gylfi ór Gumundsson, Laurent Amsaleg, Björn ór Jónsson To cite this version: Gylfi ór Gumundsson, Laurent Amsaleg, Björn ór Jónsson.
BRIEF: Binary Robust Independent Elementary Features
BRIEF: Binary Robust Independent Elementary Features Michael Calonder, Vincent Lepetit, Christoph Strecha, and Pascal Fua CVLab, EPFL, Lausanne, Switzerland e-mail: [email protected] Abstract.
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel? Jean-Daniel Zeller To cite this version: Jean-Daniel Zeller. Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?.
Minkowski Sum of Polytopes Defined by Their Vertices
Minkowski Sum of Polytopes Defined by Their Vertices Vincent Delos, Denis Teissandier To cite this version: Vincent Delos, Denis Teissandier. Minkowski Sum of Polytopes Defined by Their Vertices. Journal
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy Arthur Vaisse-Lesteven, Bruno Grilhères To cite this version: Arthur Vaisse-Lesteven, Bruno Grilhères. Additional mechanisms for rewriting
Clustering Big Data. Anil K. Jain. (with Radha Chitta and Rong Jin) Department of Computer Science Michigan State University November 29, 2012
Clustering Big Data Anil K. Jain (with Radha Chitta and Rong Jin) Department of Computer Science Michigan State University November 29, 2012 Outline Big Data How to extract information? Data clustering
Expanding Renewable Energy by Implementing Demand Response
Expanding Renewable Energy by Implementing Demand Response Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi To cite this version: Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi. Expanding Renewable
Subspace Analysis and Optimization for AAM Based Face Alignment
Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China [email protected] Stan Z. Li Microsoft
The use of computer vision technologies to augment human monitoring of secure computing facilities
The use of computer vision technologies to augment human monitoring of secure computing facilities Marius Potgieter School of Information and Communication Technology Nelson Mandela Metropolitan University
Data Mining With Big Data Image De-Duplication In Social Networking Websites
Data Mining With Big Data Image De-Duplication In Social Networking Websites Hashmi S.Taslim First Year ME Jalgaon [email protected] ABSTRACT Big data is the term for a collection of data sets which
New implementions of predictive alternate analog/rf test with augmented model redundancy
New implementions of predictive alternate analog/rf test with augmented model redundancy Haithem Ayari, Florence Azais, Serge Bernard, Mariane Comte, Vincent Kerzerho, Michel Renovell To cite this version:
Classifying Large Data Sets Using SVMs with Hierarchical Clusters. Presented by :Limou Wang
Classifying Large Data Sets Using SVMs with Hierarchical Clusters Presented by :Limou Wang Overview SVM Overview Motivation Hierarchical micro-clustering algorithm Clustering-Based SVM (CB-SVM) Experimental
LIBSVX and Video Segmentation Evaluation
CVPR 14 Tutorial! 1! LIBSVX and Video Segmentation Evaluation Chenliang Xu and Jason J. Corso!! Computer Science and Engineering! SUNY at Buffalo!! Electrical Engineering and Computer Science! University
Group Sparse Coding. Fernando Pereira Google Mountain View, CA [email protected]. Dennis Strelow Google Mountain View, CA strelow@google.
Group Sparse Coding Samy Bengio Google Mountain View, CA [email protected] Fernando Pereira Google Mountain View, CA [email protected] Yoram Singer Google Mountain View, CA [email protected] Dennis Strelow
Recognizing Cats and Dogs with Shape and Appearance based Models. Group Member: Chu Wang, Landu Jiang
Recognizing Cats and Dogs with Shape and Appearance based Models Group Member: Chu Wang, Landu Jiang Abstract Recognizing cats and dogs from images is a challenging competition raised by Kaggle platform
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin
MIFT: A Mirror Reflection Invariant Feature Descriptor
MIFT: A Mirror Reflection Invariant Feature Descriptor Xiaojie Guo, Xiaochun Cao, Jiawan Zhang, and Xuewei Li School of Computer Science and Technology Tianjin University, China {xguo,xcao,jwzhang,lixuewei}@tju.edu.cn
Study on Cloud Service Mode of Agricultural Information Institutions
Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud
Florida International University - University of Miami TRECVID 2014
Florida International University - University of Miami TRECVID 2014 Miguel Gavidia 3, Tarek Sayed 1, Yilin Yan 1, Quisha Zhu 1, Mei-Ling Shyu 1, Shu-Ching Chen 2, Hsin-Yu Ha 2, Ming Ma 1, Winnie Chen 4,
A Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 [email protected] Abstract The main objective of this project is the study of a learning based method
The Stanford Mobile Visual Search Data Set
The Stanford Mobile Visual Search Data Set Vijay Chandrasekhar 1, David M. Chen 1, Sam S. Tsai 1, Ngai-Man Cheung 1, Huizhong Chen 1, Gabriel Takacs 1, Yuriy Reznik 2, Ramakrishna Vedantham 3, Radek Grzeszczuk
View-Invariant Dynamic Texture Recognition using a Bag of Dynamical Systems
View-Invariant Dynamic Texture Recognition using a Bag of Dynamical Systems Avinash Ravichandran, Rizwan Chaudhry and René Vidal Center for Imaging Science, Johns Hopkins University, Baltimore, MD 21218,
Hinky: Defending Against Text-based Message Spam on Smartphones
Hinky: Defending Against Text-based Message Spam on Smartphones Abdelkader Lahmadi, Laurent Delosière, Olivier Festor To cite this version: Abdelkader Lahmadi, Laurent Delosière, Olivier Festor. Hinky:
Cluster Analysis: Advanced Concepts
Cluster Analysis: Advanced Concepts and dalgorithms Dr. Hui Xiong Rutgers University Introduction to Data Mining 08/06/2006 1 Introduction to Data Mining 08/06/2006 1 Outline Prototype-based Fuzzy c-means
Data Mining. Cluster Analysis: Advanced Concepts and Algorithms
Data Mining Cluster Analysis: Advanced Concepts and Algorithms Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1 More Clustering Methods Prototype-based clustering Density-based clustering Graph-based
A Genetic Algorithm-Evolved 3D Point Cloud Descriptor
A Genetic Algorithm-Evolved 3D Point Cloud Descriptor Dominik Wȩgrzyn and Luís A. Alexandre IT - Instituto de Telecomunicações Dept. of Computer Science, Univ. Beira Interior, 6200-001 Covilhã, Portugal
Automatic parameter regulation for a tracking system with an auto-critical function
Automatic parameter regulation for a tracking system with an auto-critical function Daniela Hall INRIA Rhône-Alpes, St. Ismier, France Email: [email protected] Abstract In this article we propose
Interactive person re-identification in TV series
Interactive person re-identification in TV series Mika Fischer Hazım Kemal Ekenel Rainer Stiefelhagen CV:HCI lab, Karlsruhe Institute of Technology Adenauerring 2, 76131 Karlsruhe, Germany E-mail: {mika.fischer,ekenel,rainer.stiefelhagen}@kit.edu
Build Panoramas on Android Phones
Build Panoramas on Android Phones Tao Chu, Bowen Meng, Zixuan Wang Stanford University, Stanford CA Abstract The purpose of this work is to implement panorama stitching from a sequence of photos taken
Bags of Binary Words for Fast Place Recognition in Image Sequences
IEEE TRANSACTIONS ON ROBOTICS, VOL., NO., MONTH, YEAR. SHORT PAPER 1 Bags of Binary Words for Fast Place Recognition in Image Sequences Dorian Gálvez-López and Juan D. Tardós, Member, IEEE Abstract We
Global Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
Sift of Indexing and Searching on Grid 5000 Hadoop
Scalable high-dimensional indexing with Hadoop Denis Shestakov, Diana Moise, Gylfi Thór Gudmundsson, Laurent Amsaleg To cite this version: Denis Shestakov, Diana Moise, Gylfi Thór Gudmundsson, Laurent
Use of tabletop exercise in industrial training disaster.
Use of tabletop exercise in industrial training disaster. Alexis Descatha, Thomas Loeb, François Dolveck, Nathalie-Sybille Goddet, Valerie Poirier, Michel Baer To cite this version: Alexis Descatha, Thomas
GDS Resource Record: Generalization of the Delegation Signer Model
GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, David Fort To cite this version: Gilles Guette, Bernard Cousin, David Fort. GDS Resource Record: Generalization
Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval
Information Retrieval INFO 4300 / CS 4300! Retrieval models Older models» Boolean retrieval» Vector Space model Probabilistic Models» BM25» Language models Web search» Learning to Rank Search Taxonomy!
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data
CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear
Component Ordering in Independent Component Analysis Based on Data Power
Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals
Flauncher and DVMS Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically
Flauncher and Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically Daniel Balouek, Adrien Lèbre, Flavien Quesnel To cite this version: Daniel Balouek,
siftservice.com - Turning a Computer Vision algorithm into a World Wide Web Service
siftservice.com - Turning a Computer Vision algorithm into a World Wide Web Service Ahmad Pahlavan Tafti 1, Hamid Hassannia 2, and Zeyun Yu 1 1 Department of Computer Science, University of Wisconsin -Milwaukee,
Multi-View Object Class Detection with a 3D Geometric Model
Multi-View Object Class Detection with a 3D Geometric Model Joerg Liebelt IW-SI, EADS Innovation Works D-81663 Munich, Germany [email protected] Cordelia Schmid LEAR, INRIA Grenoble F-38330 Montbonnot,
Clustering. Adrian Groza. Department of Computer Science Technical University of Cluj-Napoca
Clustering Adrian Groza Department of Computer Science Technical University of Cluj-Napoca Outline 1 Cluster Analysis What is Datamining? Cluster Analysis 2 K-means 3 Hierarchical Clustering What is Datamining?
Statistical Machine Learning
Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes
arxiv:submit/1533655 [cs.cv] 13 Apr 2016
Bags of Local Convolutional Features for Scalable Instance Search Eva Mohedano, Kevin McGuinness and Noel E. O Connor Amaia Salvador, Ferran Marqués, and Xavier Giró-i-Nieto Insight Center for Data Analytics
Interactive Robust Multitudinous Visual Search on Mobile Devices
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
Generalization Capacity of Handwritten Outlier Symbols Rejection with Neural Network
Generalization Capacity of Handwritten Outlier Symbols Rejection with Neural Network Harold Mouchère, Eric Anquetil To cite this version: Harold Mouchère, Eric Anquetil. Generalization Capacity of Handwritten
Character Image Patterns as Big Data
22 International Conference on Frontiers in Handwriting Recognition Character Image Patterns as Big Data Seiichi Uchida, Ryosuke Ishida, Akira Yoshida, Wenjie Cai, Yaokai Feng Kyushu University, Fukuoka,
Towards Unified Tag Data Translation for the Internet of Things
Towards Unified Tag Data Translation for the Internet of Things Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl To cite this version: Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl. Towards Unified
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS Jean-Marc Ginoux To cite this version: Jean-Marc Ginoux. ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS. A.H. Siddiqi,
Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition
IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu
The Delicate Art of Flower Classification
The Delicate Art of Flower Classification Paul Vicol Simon Fraser University University Burnaby, BC [email protected] Note: The following is my contribution to a group project for a graduate machine learning
Unsupervised Data Mining (Clustering)
Unsupervised Data Mining (Clustering) Javier Béjar KEMLG December 01 Javier Béjar (KEMLG) Unsupervised Data Mining (Clustering) December 01 1 / 51 Introduction Clustering in KDD One of the main tasks in
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process Amine Chellali, Frederic Jourdan, Cédric Dumas To cite this version: Amine Chellali, Frederic Jourdan, Cédric Dumas.
UNIVERSITY OF CENTRAL FLORIDA AT TRECVID 2003. Yun Zhai, Zeeshan Rasheed, Mubarak Shah
UNIVERSITY OF CENTRAL FLORIDA AT TRECVID 2003 Yun Zhai, Zeeshan Rasheed, Mubarak Shah Computer Vision Laboratory School of Computer Science University of Central Florida, Orlando, Florida ABSTRACT In this
Human behavior analysis from videos using optical flow
L a b o r a t o i r e I n f o r m a t i q u e F o n d a m e n t a l e d e L i l l e Human behavior analysis from videos using optical flow Yassine Benabbas Directeur de thèse : Chabane Djeraba Multitel
Robust Blind Watermarking Mechanism For Point Sampled Geometry
Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,
The Data Mining Process
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
Predict the Popularity of YouTube Videos Using Early View Data
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
Binary Image Scanning Algorithm for Cane Segmentation
Binary Image Scanning Algorithm for Cane Segmentation Ricardo D. C. Marin Department of Computer Science University Of Canterbury Canterbury, Christchurch [email protected] Tom
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives Chandima H. De Silva To cite this version: Chandima H. De Silva. Information Technology Education in the Sri
CATEGORIZATION OF SIMILAR OBJECTS USING BAG OF VISUAL WORDS AND k NEAREST NEIGHBOUR CLASSIFIER
TECHNICAL SCIENCES Abbrev.: Techn. Sc., No 15(2), Y 2012 CATEGORIZATION OF SIMILAR OBJECTS USING BAG OF VISUAL WORDS AND k NEAREST NEIGHBOUR CLASSIFIER Piotr Artiemjew, Przemysław Górecki, Krzysztof Sopyła
Understanding Big Data Spectral Clustering
Understanding Big Data Spectral Clustering Romain Couillet, Florent Benaych-Georges To cite this version: Romain Couillet, Florent Benaych-Georges Understanding Big Data Spectral Clustering 205 IEEE 6th
