1998
DOI: 10.1006/gmip.1998.0475
|View full text |Cite
|
Sign up to set email alerts
|

User-Steered Image Segmentation Paradigms: Live Wire and Live Lane

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
341
0
17

Year Published

2000
2000
2015
2015

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 417 publications
(359 citation statements)
references
References 30 publications
1
341
0
17
Order By: Relevance
“…For every edge, a cost is assigned to represent the "likelihood" that the edge belongs to a desired boundary in the image. How this cost function should be chosen is discussed in, e.g., [1]. When the user places a seed-point, Dijkstra's algorithm [12] is used to compute the optimal path to the seed-point from all other points in the image.…”
Section: The 2d Live-wire Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…For every edge, a cost is assigned to represent the "likelihood" that the edge belongs to a desired boundary in the image. How this cost function should be chosen is discussed in, e.g., [1]. When the user places a seed-point, Dijkstra's algorithm [12] is used to compute the optimal path to the seed-point from all other points in the image.…”
Section: The 2d Live-wire Methodsmentioning
confidence: 99%
“…Often, we also need some high-level knowledge about the type of objects we are interested in. This is recognized in [1], where the segmentation process is divided into two steps: recognition and delineation. Recognition is the task of roughly determining where in the image the objects are located, while delineation consists of determining the exact extent of the object.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The strength μ(p) of a path is defined as the strength of its κ-weakest link; that is, (1) when l > 1, and μ(p) = 1 for l = 1. For c, d ∈ A ⊆ C the fuzzy κ-connectedness strength in A between c and d is defined as the strength of a strongest path in A between c and d; that is, (2) If κ is a hard binary relation, κ: C × C → {0, 1}, then the relation μ A is known as a transitive closure of κ ∩ (A × A). Note that It is also not difficult to see (and it follows easily from Proposition 2.1 below) that…”
Section: Basic Definitions and Notationmentioning
confidence: 99%
“…We now overcome this theoretical challenge and generalize its theory to multiple objects. (2) In this process of generalization, several most fundamental properties of AFC, RFC, and IRFC have been uncovered. They allow us to better understand the behavior of the FC process in general, and IRFC in particular, and give us a single unified theoretical framework within which all members of FC family methods can be described elegantly.…”
Section: Introductionmentioning
confidence: 99%