Search Results for author: Ruzena Bajcsy

Found 7 papers, 0 papers with code

Fast forwarding Egocentric Videos by Listening and Watching

no code implementations12 Jun 2018 Vinicius S. Furlan, Ruzena Bajcsy, Erickson R. Nascimento

The remarkable technological advance in well-equipped wearable devices is pushing an increasing production of long first-person videos.

Revisiting Active Perception

no code implementations8 Mar 2016 Ruzena Bajcsy, Yiannis Aloimonos, John K. Tsotsos

Despite the recent successes in robotics, artificial intelligence and computer vision, a complete artificial agent necessarily must include active perception.

Remote Health Coaching System and Human Motion Data Analysis for Physical Therapy with Microsoft Kinect

no code implementations21 Dec 2015 Qifei Wang, Gregorij Kurillo, Ferda Ofli, Ruzena Bajcsy

In order to generate the kinematic parameter from the noisy data captured by Kinect, we propose a kinematic filtering algorithm based on Unscented Kalman Filter and the kinematic model of human skeleton.

Evaluation of Pose Tracking Accuracy in the First and Second Generations of Microsoft Kinect

no code implementations13 Dec 2015 Qifei Wang, Gregorij Kurillo, Ferda Ofli, Ruzena Bajcsy

Microsoft Kinect camera and its skeletal tracking capabilities have been embraced by many researchers and commercial developers in various applications of real-time human movement analysis.

Pose Tracking

Unsupervised Temporal Segmentation of Repetitive Human Actions Based on Kinematic Modeling and Frequency Analysis

no code implementations13 Dec 2015 Qifei Wang, Gregorij Kurillo, Ferda Ofli, Ruzena Bajcsy

In this paper, we propose a method for temporal segmentation of human repetitive actions based on frequency analysis of kinematic parameters, zero-velocity crossing detection, and adaptive k-means clustering.

Clustering Segmentation

Private Disclosure of Information in Health Tele-monitoring

no code implementations28 Apr 2015 Daniel Aranki, Ruzena Bajcsy

We show cases where it is possible to achieve perfect privacy regardless of the adversary's auxiliary knowledge while preserving full utility of the information to the intended recipient and provide sufficient conditions for such cases.

Cannot find the paper you are looking for? You can Submit a new open access paper.