2014
DOI: 10.1007/978-3-319-04114-8_4
|View full text |Cite
|
Sign up to set email alerts
|

Visual Saliency Weighting and Cross-Domain Manifold Ranking for Sketch-Based Image Retrieval

Abstract: Abstract.A Sketch-Based Image Retrieval (SBIR) algorithm compares a linedrawing sketch with images. The comparison is made difficult by image background clutter. A query sketch includes an object of interest only, while database images would also contain background clutters. In addition, variability of hand-drawn sketches, due to "stroke noise" such as disconnected and/or wobbly lines, also makes the comparison difficult. Our proposed SBIR algorithm compares edges detected in an image with lines in a sketch. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 15 publications
(46 reference statements)
0
14
0
Order By: Relevance
“…Sketch based retrieving methods are also used for retrieving 3D images on [56], [57], [58]. In computer graphics, there is an important application is retrieving the 3D models from 2D.…”
Section: Various Approaches and Techniques For Retrieving 3d Imagementioning
confidence: 99%
“…Sketch based retrieving methods are also used for retrieving 3D images on [56], [57], [58]. In computer graphics, there is an important application is retrieving the 3D models from 2D.…”
Section: Various Approaches and Techniques For Retrieving 3d Imagementioning
confidence: 99%
“…To accelerate the development of low-end smart phones, all terminal manufacturers launched a different system of smart phones, mobile internet terminal types have become more, the security flaw also increased. Due to the user has natural viscous, personal information has very high value, continuous expansion of payment and business office functions, carrying a huge commercial value, so threats than a computer user more serious [10][11][12]. IP processing of telecommunication network can make the closed network interconnection, but this also introduces the Internet's system vulnerabilities and security threats to the telecommunication network, which makes the security risk increased.…”
Section: Related Workmentioning
confidence: 99%
“…It can be seen, the existing research is still based on physical transport layer and application layer scheduling combining way, the focus remains at the physical layer, application layer business are mainly concentrated in upload and download data transmission, which is obviously does not meet the requirements of mobile Internet. The computational quantity of Internet is studied by [10], and the calculation of the dynamic distribution is accord with the method of cloud computing. In order to improve the efficiency of the distribution, [11] is used to calculate the load distribution of the workload.…”
Section: Research Status Of Cloud Computingmentioning
confidence: 99%