2007 IEEE 11th International Conference on Computer Vision 2007
DOI: 10.1109/iccv.2007.4408865
|View full text |Cite
|
Sign up to set email alerts
|

A Scalable Approach to Activity Recognition based on Object Use

Abstract: We propose an approach to activity recognition based on detecting and analyzing the sequence of objects that are being manipulated by the user. In domains such as cooking, where many activities involve similar actions, object-use information can be a valuable cue. In order for this approach to scale to many activities and objects, however, it is necessary to minimize the amount of human-labeled data that is required for modeling. We describe a method for automatically acquiring object models from video without… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
174
0
3

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 253 publications
(184 citation statements)
references
References 24 publications
0
174
0
3
Order By: Relevance
“…Most previous work on activity classification has focused on using 2D video (e.g., [26,10]) or RFID sensors placed on humans and objects (e.g., [41]). The use of 2D videos leads to relatively low accuracy (e.g., 78.5% in [19]) even when there is no clutter.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Most previous work on activity classification has focused on using 2D video (e.g., [26,10]) or RFID sensors placed on humans and objects (e.g., [41]). The use of 2D videos leads to relatively low accuracy (e.g., 78.5% in [19]) even when there is no clutter.…”
Section: Introductionmentioning
confidence: 99%
“…One common approach is to use space-time features to model points of interest in video [15,6]. Several authors have supplemented these techniques by adding more information to these features [11,40,41,19,25,30]. However, this approach is only capable of classifying, rather than detecting, activities.…”
Section: Introductionmentioning
confidence: 99%
“…A common solution is to detect whether a particular user, or rather his arm, is in close proximity to an object by employing the RFID [4,8,31] technology or other RFbased solutions [6]. Each object is equipped with an RFID tag, while the user wears a reader on his hand or lower arm.…”
Section: Related Workmentioning
confidence: 99%
“…Each of these has its own limitations. RFID systems may erroneously mark an object as being held by the user just because it is in close proximity or, conversely, the user's interaction may be missed when the object is grabbed at a great distance from the RFID tag [31]. The techniques using contact switches and monitoring the power consumption of appliances in the home provide no information on the user's identity and therefore those only provide a suitable solution when the identity of the user either is known implicitly or not important.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation