Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
In this paper we describe a new approach for the multitrack initiation problem. We propose an extensive use of the top-view reconstruction of the scene to solve the detection step in tracking pedestrians. We leave a large set of starting hypothetical movin ...
In this paper we propose a method for the automatic counting of pedestrians in video sequences for (automatic) video surveillance applications. We analyse the trajectory data set provided by a detection/tracking system. When using classical target detectio ...
To formally describe architectures of software systems, specific languages called Architecture Description Languages (ADLs) have been developed by academic institutions and research labs. However, more and more research and industrial projects are using th ...
Shadow segmentation is a critical issue for systems aiming at extracting, tracking or recognizing objects in a given scene. Shadows can in fact modify the shape and colour of objects and therefore affect scene analysis and interpretation systems in many ap ...
Assessing and comparing the performance of watermarking algorithms is di cult.The visibility of the watermark is an important aspect in this process.In this paper,we propose two metrics for evaluating the visual impact of video watermarks.Based on several ...
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious agents are extensively being tackled. We concentrate on the reverse problem, na ...