出处 发表于 2025-3-26 22:33:00

Person Re-identification by Multiple Feature Representations and Metric Learningtwo critical aspects in person re-identification. In this paper, we first propose an effective Convolutional Neural Network and learn it with mixed datasets as a general deep feature extractor. Secondly, we extract the hand-crafted feature of images as a supplement, then we learn the independent dis

Pruritus 发表于 2025-3-27 01:44:27

http://reply.papertrans.cn/48/4702/470195/470195_32.png

FUME 发表于 2025-3-27 07:56:38

Salient Object Detection from Single Haze Images via Dark Channel Prior and Region Covariance Descrial model of visual saliency to cope with this issue. Superpixel-level saliency map is firstly abstracted via the dark channel prior. Then, region covariance descriptors are utilized to estimate local and global saliency of each superpixel. Besides, the graph model is incorporated as constraint to op

observatory 发表于 2025-3-27 12:49:34

http://reply.papertrans.cn/48/4702/470195/470195_34.png

LEVY 发表于 2025-3-27 17:17:54

http://reply.papertrans.cn/48/4702/470195/470195_35.png

无畏 发表于 2025-3-27 17:59:31

Fast Vehicle Detection in Satellite Images Using Fully Convolutional Networkameworks have been proposed to solve this problem. However, like the traditional ways of object detection in natural images those methods all consist of multiple separated stages. Region proposals are first produced, then, fed into the feature extractor and classified finally. Multi-stage detection

避开 发表于 2025-3-28 00:34:50

http://reply.papertrans.cn/48/4702/470195/470195_37.png

Sarcoma 发表于 2025-3-28 04:23:34

http://reply.papertrans.cn/48/4702/470195/470195_38.png

谎言 发表于 2025-3-28 09:09:55

Xiaoqiang Zhang,Yanning Zhang,Tao Yang,Zhi Li,Dapeng Tao threats, how to mitigate/handle them, and advice and best p.Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools

congenial 发表于 2025-3-28 14:20:58

Xue Wang,Qing Wange your communications, and become anonymous online using sophisticated yet practical tools and techniques..This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate soc
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Intelligent Visual Surveillance; 4th Chinese Conferen Zhang Zhang,Kaiqi Huang Conference proceedings 2016 Springer Nature Singapore Pte Ltd