2006 IEEE International Conference on Video and Signal Based Surveillance 2006
DOI: 10.1109/avss.2006.17
|View full text |Cite
|
Sign up to set email alerts
|

Activity Topology Estimation for Large Networks of Cameras

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
9
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 8 publications
1
9
0
Order By: Relevance
“…It is worth pointing out that van den Hengel et al (2006) also attempted to infer the camera topology without relying on object tracking. Their method starts with full connectivity among camera views and gradually eliminates linkages among image regions that exhibit simultaneous object occupancy and vacancy.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It is worth pointing out that van den Hengel et al (2006) also attempted to infer the camera topology without relying on object tracking. Their method starts with full connectivity among camera views and gradually eliminates linkages among image regions that exhibit simultaneous object occupancy and vacancy.…”
Section: Previous Workmentioning
confidence: 99%
“…To facilitate more efficient multi-camera surveillance and reduce the burden on human operators, growing research efforts have been undertaken on automated activity understanding in camera networks, focusing on camera topology inference (Makris et al 2004;Tieu et al 2005;van den Hengel et al 2006), person re-identification (Javed et al 2003(Javed et al , 2005Prosser et al 2008;Gheissari et al 2006;Gray and Tao 2008;Hu et al 2006a;Zheng et al 2009), and global activity analysis (Lee et al 2000;Wang et al 2010;Zelniker et al 2008). In topology inference, the aim is to infer spatial and temporal relationships between cameras.…”
Section: Introductionmentioning
confidence: 97%
“…In concept it is similar to the simulator used to prototype exclusion [11]. The authenticity of that simulator is borne out by subsequent real implementations of that technique.…”
Section: System Modelmentioning
confidence: 97%
“…ASAP [10] provides scalable resource management by using application-specific prioritization cues. Hengel et al [11] approach scalability by partitioning the system according to an activity topology describing the observed (past) behavior of target objects in the network. OASIS provides a service-oriented programming framework for composing an application as a graph of modular services.…”
Section: D H I S T = C a L C H I S T ( Img Nb ) ; T R A C K E Rmentioning
confidence: 99%
“…Other projects that are related to TC include ASAP [10]; the activity topology design based surveillance middleware [11]; service-oriented architectures for sensor networks such as OASIS [12]; and the high level abstractions for sensor network programming [13], [14]. ASAP [10] provides scalable resource management by using application-specific prioritization cues.…”
Section: D H I S T = C a L C H I S T ( Img Nb ) ; T R A C K E Rmentioning
confidence: 99%