2013 Seventh International Conference on Distributed Smart Cameras (ICDSC) 2013
DOI: 10.1109/icdsc.2013.6778221
|View full text |Cite
|
Sign up to set email alerts
|

Remote feature learning for mobile re-identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Liu et al [36] provided extensive study of feature importance for person reidentification and proposed a method for on-the-fly mining of feature. For person reidentification on mobile devices, Vernier et al [37] introduced a client-server system that improved the reidentification performance over time with reduced computation time.…”
Section: A Related Workmentioning
confidence: 99%
“…Liu et al [36] provided extensive study of feature importance for person reidentification and proposed a method for on-the-fly mining of feature. For person reidentification on mobile devices, Vernier et al [37] introduced a client-server system that improved the reidentification performance over time with reduced computation time.…”
Section: A Related Workmentioning
confidence: 99%
“…In spite of growing interest in re-identifying people in a non-overlapping embedded smart cameras (e.g., mobile phone), there are limited works that address person mobile reidentification [2,6]. Since no data sets including videos captured by mobile devices are publicly available.…”
Section: Introductionmentioning
confidence: 98%
“…To address these problems, uncalibrated disjoint cameras (namely embedded smart cameras, i.e., videos captured by embedded cameras without any knowledge of camera placement or device setting) are now being employed for person re-identification [2,6]. In spite of growing interest in re-identifying people in a non-overlapping embedded smart cameras (e.g., mobile phone), there are limited works that address person mobile reidentification [2,6].…”
Section: Introductionmentioning
confidence: 98%
“…In the first approach, the re-identification is attacked by means of a discriminative signature based method [3,4,5,6]. Given an image, the person body parts are detected using camera specific learned models, then local and global features are adopted to create a discriminative person signature.…”
Section: Distributed Person Re-identificationmentioning
confidence: 99%