- document
-
Jung, B. (author), de Jong, M. (author), Fermani, P. (author), on behalf of the KM3NeT Collaboration, (author)The cubic-kilometre neutrino telescope, consisting of large-scale 3D-arrays of photomultiplier tubes (PMTs) currently under construction on the Mediterranean seabed, relies on accurate calibration procedures in order to answer its science goals. These proceedings present an overview of a novel gain calibration method based on highly compressed...conference paper 2021
- document
-
van Rooijen, A.L. (author), Bouma, H. (author), Verbeek, F. (author)Person re-identification (re-id) is the task of identifying a person of interest across disjoint camera views in a multi-camera system. This is a challenging problem due to the different poses, viewpoints and lighting conditions. Deeply learned systems have become prevalent in the person re-identification field as they are capable to deal with...conference paper 2019
- document
-
van Diggelen, J. (author), Neerincx, M.A. (author), Peeters, M. (author), Schraagen, J.M. (author)Human-agent teams exhibit emergent behavior at the team level, as a result of interactions between individuals within the team. This begs the question how to design artificial team members (agents) as adequate team players that contribute to the team processes advancing team performance, resilience, and learning. This paper proposes the...article 2019
- document
-
Kronemeijer, A.J. (author), Katsouras, I. (author), Poodt, P. (author), Akkerman, H.B. (author), van Breemen, A.J.J.M. (author), Gelinck, G.H. (author)We present recent developments on flexible a-IGZO TFT technology scaling in terms of TFT channel length and operating voltage, as well as manufacturing cost optimization with a focus on R2R processing compatibility. We present progress on the relevant technology building blocks; (i) R2R compatible TFT architecture, (ii) (multilevel) nanoimprint...conference paper 2018
- document
- Kong, G. (author), Alais, D. (author), van der Burg, E.D. (author) article 2017
- document
-
Tuma, M. (author), Rorbech, V. (author), Prior, M. (author), Igel, C. (author)We designed and jointly optimized an integrated signal processing chain for detection and classification of long-range passive-acoustic underwater signals recorded by the global geophysical monitoring network of the Comprehensive Nuclear-Test-Ban Treaty Organization. Starting at the level of raw waveform data, a processing chain of signal...article 2016
- document
-
Kong, G. (author), Alais, D. (author), van der Burg, E.D. (author)In the present study, we examine how observers search among complex displays. Participants were asked to search for a big red horizontal line among 119 distractor lines of various sizes, orientations and colours, leading to 36 different feature combinations. To understand how people search in such a heterogeneous display, we evolved the search...article 2016
- document
-
Burghouts, G.J. (author), van Eekeren, A.W.M. (author), Dijk, J. (author)This paper presents a system to extract metadata about human activities from full-motion video recorded from a UAV. The pipeline consists of these components: tracking, motion features, representation of the tracks in terms of their motion features, and classification of each track as one of the human activities of interest. We consider these...conference paper 2014
- document
-
van der Greef, J. (author), van Wietmarschen, H. (author), van Ommen, B. (author), Verheij, E.R. (author)Metabolites have played an essential role in our understanding of life, health, and disease for thousands of years. This domain became much more important after the concept of metabolism was discovered. In the 1950s, mass spectrometry was coupled to chromatography and made the technique more application-oriented and allowed the development of...article 2013
- document
-
van Leeuwen, C. (author), Halma, A. (author), Schutte, K. (author)Detection of anomalies (outliers or abnormal instances) is an important element in a range of applications such as fault, fraud, suspicious behavior detection and knowledge discovery. In this article we propose a new method for anomaly detection and performed tested its ability to detect anomalous behavior in videos from DARPA's Mind's Eye...conference paper 2013
- document
- Azzopardi, G. (author) doctoral thesis 2013
- document
-
Bouma, H. (author), Raaijmakers, S.A. (author), Halma, A.H.R. (author), Wedemeijer, H. (author)Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming to monitor many websites. In this paper, we...conference paper 2012
- document
-
Koldijk, S.J. (author), van Staalduinen, M. (author), Neerincx, M.A. (author), Kraaij, W. (author)Motivation– Supporting knowledge workers in their self-management by providing them overviews of performed tasks.Research approach– Computer interaction data of knowledge workers was logged during their work. For each user different classifiers were trained and compared on their performance on recognizing 12 specified tasks.Findings/Design–...conference paper 2012
- document
-
Koldijk, S.J. (author)Motivation– Developing a computer tool that improves well-being at work.Research approach– We collect unobtrusive sensor data and apply pattern recognition approaches to infer the context and stress level of the user. We will develop a coaching tool based upon this information and evaluate its effectiveness in user studies. Findings/Design– The...conference paper 2012
- document
-
Burghouts, G.J. (author), Bouma, H. (author), den Hollander, R.J.M. (author), van den Broek, S.P. (author), Schutte, K. (author)We have developed a system that recognizes 48 human behaviors from video. The essential elements are (i) inference of the actors in the scene, (ii) assessment of event-related properties of actors and between actors, (iii) exploiting the event properties to recognize the behaviors. The performance of our recognizer approaches human performance,...conference paper 2012
- document
-
On the early detection of threats in the real world based on open-source information on the internetBouma, H. (author), Rajadell Rojas, O. (author), Worm, D.T.H. (author), Versloot, C.A. (author), Wedemeijer, H. (author)Many threats in the real world can be related to activities of persons on the internet. Internet surveillance aims to detect threats in an early stage and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming to monitor many open sources. In this...conference paper 2012
- document
-
Hofmann, K.M. (author), Gavrila, D.M. (author)We introduce a framework for unconstrained 3D human upper body pose estimation from multiple camera views in complex environment. Its main novelty lies in the integration of three components: single-frame pose recovery, temporal integration and model texture adaptation. Single-frame pose recovery consists of a hypothesis generation stage, in...article 2012
- document
-
Burghouts, G.J. (author), Marck, J.W. (author)We propose a mechanism to assess threats that are based on observables. Observables are properties of persons, i.e., their behavior and interaction with other persons and objects. We consider observables that can be extracted from sensor signals and intelligence. In this paper, we discuss situation assessment that is based on observables for...article 2011
- document
-
Hofmann, K.M. (author)The recovery of 3D human pose is an important problem in computer vision with many potential applications in human computer interfaces, motion analysis (e.g. sports, medical) and surveillance. 3D human pose also provides informative, viewinvariant features for a subsequent activity recognition step. Most if not all previous work on 3D human pose...doctoral thesis 2011
- document
-
Burghouts, G.J. (author), den Hollander, R. (author), Schutte, K. (author), Marck, J.W. (author), Landsmeer, S. (author), den Breejen, E. (author)This paper discusses the decomposition of hostile intentions into abnormal behaviors. A list of such behaviors has been compiled for the specific case of public transport. Some of the deviant behaviors are hard to observe by people, as they are in the midst of the crowd. Examples are deviant walking patterns, prohibited actions such as taking...conference paper 2011