Proceedings of the 21st International Middleware Conference 2020
DOI: 10.1145/3423211.3425686
|View full text |Cite
|
Sign up to set email alerts
|

Coral-Pie

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…The pose keypoint regressor takes a vehicle image as input and yields 20 response maps of the vehicle's keypoints. As shown in Figure 6 and C 4 = [3,4,5,7,12,13,16,18]. The final output region masks are computed as the summation of all the feature maps belonging to each cluster:…”
Section: Keypoint-based Pose Classifiermentioning
confidence: 99%
See 1 more Smart Citation
“…The pose keypoint regressor takes a vehicle image as input and yields 20 response maps of the vehicle's keypoints. As shown in Figure 6 and C 4 = [3,4,5,7,12,13,16,18]. The final output region masks are computed as the summation of all the feature maps belonging to each cluster:…”
Section: Keypoint-based Pose Classifiermentioning
confidence: 99%
“…In recent years, there has been an explosive growth of massive surveillance camera installations that become an indispensable part of human life in urban public spaces with particular benefits for security services [1][2][3][4][5]. One of the significant functions of urban surveillance systems is to assist security officers in locating suspicious objects whereby the task entails an input query object's image, and the objective is to search for the same target in videos recorded by various cameras.…”
Section: Introductionmentioning
confidence: 99%