Search Results for author: Mehrsan Javan

Found 8 papers, 2 papers with code

Detecting and Matching Related Objects with One Proposal Multiple Predictions

1 code implementation23 Apr 2021 Yang Liu, Luiz G. Hafemann, Michael Jamieson, Mehrsan Javan

Tracking players in sports videos is commonly done in a tracking-by-detection framework, first detecting players in each frame, and then performing association over time.

Learning Agent Representations for Ice Hockey

no code implementations NeurIPS 2020 Guiliang Liu, Oliver Schulte, Pascal Poupart, Mike Rudd, Mehrsan Javan

This paper develops a new approach for agent representations, based on a Markov game model, that is tailored towards applications in professional ice hockey.

Sports Analytics

Player Identification in Hockey Broadcast Videos

no code implementations5 Sep 2020 Alvin Chan, Martin D. Levine, Mehrsan Javan

We propose an end-to-end trainable ResNet+LSTM network, with a residual network (ResNet) base and a long short-term memory (LSTM) layer, to discover spatio-temporal features of jersey numbers over time and learn long-term dependencies.

A Flow-Guided Mutual Attention Network for Video-Based Person Re-Identification

no code implementations9 Aug 2020 Madhu Kiran, Amran Bhuiyan, Louis-Antoine Blais-Morin, Mehrsan Javan, Ismail Ben Ayed, Eric Granger

Our Mutual Attention network relies on the joint spatial attention between image and optical flow features maps to activate a common set of salient features across them.

Optical Flow Estimation Video-Based Person Re-Identification

Optimizing Through Learned Errors for Accurate Sports Field Registration

1 code implementation17 Sep 2019 Wei Jiang, Juan Camilo Gamboa Higuera, Baptiste Angles, Weiwei Sun, Mehrsan Javan, Kwang Moo Yi

We propose an optimization-based framework to register sports field templates onto broadcast videos.

Exploiting Prunability for Person Re-Identification

no code implementations4 Jul 2019 Hugo Masson, Amran Bhuiyan, Le Thanh Nguyen-Meidine, Mehrsan Javan, Parthipan Siva, Ismail Ben Ayed, Eric Granger

Then, these techniques are analysed according to their pruningcriteria and strategy, and according to different scenarios for exploiting pruningmethods to fine-tuning networks to target domains.

Person Re-Identification

Cannot find the paper you are looking for? You can Submit a new open access paper.