Keywords
- Transmission Control Protocol
- Training Image
- Automatic Target Recognition
- Motion History Image
- Correlation Filter
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Javed O. and Shah M. (2002). “Tracking and object classification for automated surveillance.” in: The Seventh European Conference on Computer Vision (ECCV 2002), Copenhagen.
Javidi B., Ed. (2002). Correlation pattern recognition: An optimum approach. Image Recognition and Classification: Algorithms, Systems, and Applications. (BICTL) Marcel Dekker, New York. pp. 295–321.
Bobick A. and Davis J. (2001). “The recognition of human movements using temporal Templates.” Trans. IEEE PAMI, 23(3).
Khan, S. Javed, O. and Shah M. (2001). “Tracking in uncalibrated cameras with overlapping field of view.” Performance Evaluation of Tracking and Surveillance PETS 2001, (with CVPR 2001), Kauai, Hawaii, 9th, Dec 2001.
Vijaya Kumar BVK (1992). “Tutorial survey of composite filter designs for optical correlators.” Appl. Opt., Vol. 31, pp. 4773–4801, 1992
Sudharshanan, SI Mahalanobis, A. and Sundareshan, MK. (1990). “Selection of optimum output correlation values in synthetic discriminant function design.” J. Opt. Soc. Am. A., 7(4): 611–616.
Mahalanobis A, Vijaya Kumar, BVK Sims, SRF and Epperson J. (1994). “Unconstrained correlation filters.” Appl. Opt. 33: 3751–3759.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
Mahalanobis, A., Shah, M., van Nevel, A. (2006). Information Processing Across Distributed and Netted Systems for Security and Surveillance. In: Javidi, B. (eds) Optical Imaging Sensors and Systems for Homeland Security Applications. Advanced Sciences and Technologies for Security Applications, vol 2. Springer, New York, NY. https://doi.org/10.1007/0-387-28001-4_11
Download citation
DOI: https://doi.org/10.1007/0-387-28001-4_11
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-26170-6
Online ISBN: 978-0-387-28001-1
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)