2013
DOI: 10.1007/978-3-642-41184-7_73
|View full text |Cite
|
Sign up to set email alerts
|

White Paper on Industrial Applications of Computer Vision and Pattern Recognition

Abstract: The paper provides a summary of the contributions to the industrial session at ICIAP2013, describing a few practical applications of Video Analysis, in the Surveillance and Security field. The session has been organized to stimulate an open discussion within the scientific community of CVPR on new emerging research areas which deserve particular attention, and may contribute to the improvement of industrial applications in the near future

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…AI is revolutionizing cybersecurity due to extensive analysis of data, faster reaction times, and effective customization of threat detection for limited records. Further, Artificial Intelligence has already-existing and synergistic applications for pattern recognition and computer vision to identify physical threats [12]. The authors of [15] have created a hybrid IoT generator, a framework for estimating cellular network performance.…”
Section: Related Workmentioning
confidence: 99%
“…AI is revolutionizing cybersecurity due to extensive analysis of data, faster reaction times, and effective customization of threat detection for limited records. Further, Artificial Intelligence has already-existing and synergistic applications for pattern recognition and computer vision to identify physical threats [12]. The authors of [15] have created a hybrid IoT generator, a framework for estimating cellular network performance.…”
Section: Related Workmentioning
confidence: 99%
“…3 The e-Coaching Ecosystem: an Overview In this section, we provide an overview of the e-Coaching ecosystem by putting forward a typical interaction flow between a coach and a sportsman. We do not provide any technical details about the implementation of the software infrastructure [9,15], given that it is built entirely using a standard distributed software architecture with well-known cutting-edge technologies. The ecosystem is made up of three main actors: the business logic, a web application, and a mobile client available for both the Android and the iOS mobile platforms that records training statistics exploiting mainly devices' GPS sensor and external ECGs.…”
Section: Our Contributionmentioning
confidence: 99%
“…Many of the models presented so far (DP-3T [4] , the Exposure Notification framework by Apple/Google [5] ) use a centralized back-end system for the notification of contagion and contact events at risk. The main goal of the proposed system is to guarantee users’ privacy through a decentralized approach by exploiting blockchain technology, yielding transparent operation, consultation and prevention of wide data breaches which can impact a massive group of people [6] . In particular, the novelty proposed in this work consists in the use of a special type of token called Non Fungible Tokens (NFT) whose characteristics allows to uniquely represent a contagion that can be anonymously notified to tested person and also made public.…”
Section: Introductionmentioning
confidence: 99%