2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Volume 1 (CVPR'06)
DOI: 10.1109/cvpr.2006.195
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Object Tracking Through Simultaneous Long Occlusions and Split-Merge Conditions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
174
0

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 217 publications
(176 citation statements)
references
References 6 publications
2
174
0
Order By: Relevance
“…Our method for evaluation is similar to [2] and measures performance of both detection and tracking. We compute the following distance measure between generated tracks and ground truth tracks:…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Our method for evaluation is similar to [2] and measures performance of both detection and tracking. We compute the following distance measure between generated tracks and ground truth tracks:…”
Section: Resultsmentioning
confidence: 99%
“…Data obtained from such a sensor is quite different from the standard aerial and ground surveillance datasets, such as VIVID and NGSIM, which have been used in [1,2], as well as aerial surveillance scenario [3][4][5]. First, objects in WAS data are much smaller, with vehicle sizes ranging from 4 to 70 pixels in grayscale imagery, compared to over 1500 pixels in color imagery in the VIVID dataset.…”
Section: Introductionmentioning
confidence: 99%
“…A popular approach to multi-object tracking is to run a low-level tracker to obtain "tracklets", and then stitch together tracklets using various graph-based formalisms or greedy heuristics [15,22,16,19,2]. Such graph-based algorithms include flow-networks [25], linear-programming formulations [14], and matching algorithms [15].…”
Section: Related Workmentioning
confidence: 99%
“…Inference would "explain away" evidence and enforce exclusion. In practice, the typical solution is to apply non-max suppression (NMS) as a pre-process to prune the set of candidate locations V prior to multi-object tracking [19,6,14,25].…”
Section: Track Interdependencementioning
confidence: 99%
“…They rely on Conditional Random Fields [17,27], belief Propagation [29,9], Dynamic or Linear Programming [3,10]. Among the latter, some operate on graphs whose nodes can either be all the spatial locations of potential people presence [26,11,5,1], only those where a detector has fired [25,15], or short temporal sequences of consecutive detections that are very likely to correspond to the same person [21,30,23,4].…”
Section: Related Workmentioning
confidence: 99%