Author of the publication

IBM-Northwestern@TRECVID 2014: Surveillance Event Detection.

, , , , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-modal biometrics for mobile authentication., , , , , , , , , and 1 other author(s). IJCB, page 1-8. IEEE, (2014)Automated Medical Image Modality Recognition by Fusion of Visual and Text Information., , , , and . MICCAI (2), volume 8674 of Lecture Notes in Computer Science, page 487-495. Springer, (2014)Retail video analytics: an overview and survey., , , , , and . Video Surveillance and Transportation Imaging Applications, volume 8663 of SPIE Proceedings, page 86630X. SPIE, (2013)Biometric Recognition: Security and Privacy Concerns, , and . IEEE Security & Privacy, 1 (2): 33-42 (2003)Enhanced rail component detection and consolidation for rail track inspection., , , , and . WACV, page 289-295. IEEE Computer Society, (2012)Fingerprint enhancement., , , and . WACV, page 202-207. IEEE Computer Society, (1996)Accurate coverage summarization of UAV videos., , and . AIPR, page 1-5. IEEE Computer Society, (2014)An Extensible Language Interfacefor Robot Manipulation., , , , and . AGI, volume 7716 of Lecture Notes in Computer Science, page 21-30. Springer, (2012)Evaluation Techniques for Biometrics-Based Authentication Systems (FRR)., , and . ICPR, page 2831-2837. IEEE Computer Society, (2000)Minutia Verification and Classification for Fingerprint Matching., , , , and . ICPR, page 1025-1029. IEEE Computer Society, (2000)