Zhaohui Sun

Learn More
This paper studies error characterization of the factorization method for 3-D shape and motion recovery from image sequences using matrix perturbation theory and covariance propagation for linear models. Given the 2-D projections of a set of feature points across multiple image frames and small perturbations/covariances of the feature point coordinates,(More)
—Following a brief overview of two-dimensional (2-D) parametric motion models commonly used in video manipulation and compression, we introduce trifocal transfer, which is an image-based scene representation used in computer vision, as a motion compensation method that uses three frames at a time to implicitly capture camera/scene motion and scene depth.(More)
Complete and accurate video tracking is very difficult to achieve in practice due to long occlusions, traffic clutter, shadows and appearance changes. In this paper, we study the feasibility of event recognition when object tracks are fragmented. By changing the lock score threshold controlling track termination, different levels of track fragmentation are(More)
Probabilistic suffix tree (PST) is a stochastic model that uses a suffix tree as an index structure to store conditional probabilities associated with subsequences. PST has been successfully used to model and predict protein families following global approach. Their approach takes into account the entire sequence, and thus is not suitable for partially(More)
The recognition of regulatory motifs of co-regulated genes is essential for understanding the regulatory mechanisms. However, the automatic extraction of regulatory motifs from a given data set of the upstream non-coding DNA sequences of a family of co-regulated genes is difficult because regulatory motifs are often subtle and inexact. This problem is(More)
A combined source/channel coding scheme without explicit error protection is proposed to transmit images through binary noisy channels. Unlike the error protection with re-transmission scheme and error concealment scheme by inserting synchronization codewords to entropy-coded bitstream, the proposed coding scheme employs transform coding, "xed-rate uniform(More)