Henri Bouma
Henri Bouma
Senior scientist at TNO
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Automatic detection of pulmonary embolism in CTA images
H Bouma, JJ Sonnemans, A Vilanova, FA Gerritsen
IEEE transactions on medical imaging 28 (8), 1223-1230, 2009
Automatic detection of small surface targets with electro-optical sensors in a harbor environment
H Bouma, DJJ de Lange, SP van den Broek, RAW Kemp, PBW Schwering
SPIE Europe Security and Defence, 711402-711402-8, 2008
Selection of negative samples and two-stage combination of multiple features for action detection in thousands of videos
GJ Burghouts, K Schutte, H Bouma, RJM den Hollander
Machine Vision and Applications 25 (1), 85-98, 2014
Real-time tracking and fast retrieval of persons in multiple surveillance cameras of a shopping mall
H Bouma, J Baan, S Landsmeer, C Kruszynski, G van Antwerpen, J Dijk
SPIE Defense, Security, and Sensing, 87560A-87560A-13, 2013
Re-identification of persons in multi-camera surveillance under varying viewpoints and illumination
H Bouma, S Borsboom, RJM den Hollander, SH Landsmeer, M Worring
SPIE Defense, Security, and Sensing, 83590Q-83590Q-10, 2012
Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall
H Bouma, J Baan, GJ Burghouts, PT Eendebak, JR van Huis, J Dijk, ...
Optics and Photonics for Counterterrorism, Crime Fighting, and Defence X …, 2014
Instantaneous threat detection based on a semantic representation of activities, zones and trajectories
GJ Burghouts, K Schutte, RJM ten Hove, SP van den Broek, J Baan, ...
Signal, Image and Video Processing 8 (1), 191-200, 2014
Recognition and localization of relevant human behavior in videos
H Bouma, G Burghouts, L de Penning, P Hanckmann, JM ten Hove, ...
SPIE Defense, Security, and Sensing, 87110B-87110B-10, 2013
Tracking individuals in surveillance video of a high-density crowd
N Hu, H Bouma, M Worring
SPIE Defense, Security, and Sensing, 839909-839909-8, 2012
Correction for the dislocation of curved surfaces caused by the PSF in 2D and 3D CT images
H Bouma, A Vilanova, LJ Van Vliet, FA Gerritsen
IEEE transactions on pattern analysis and machine intelligence 27 (9), 1501-1507, 2005
A reconfigurable function array architecture for 3G and 4G wireless terminals
PM Heysters, H Bouma, J Smit, GJM Smit, PJM Havinga
World Wireless Congress, WWC 2002: On Third Generation Wireless and Beyond …, 2002
Segmentation and wake removal of seafaring vessels in optical satellite images
H Bouma, RJ Dekker, RM Schoemaker, AA Mohamoud
SPIE Security+ Defence, 88970B-88970B-11, 2013
Automatic human action recognition in a scene from visual inputs
H Bouma, P Hanckmann, JW Marck, L Penning, R den Hollander, ...
SPIE Defense, Security, and Sensing, 83880L-83880L-10, 2012
Precise local blur estimation based on the first-order derivative
H Bouma, J Dijk, AWM van Eekeren
SPIE Defense, Security, and Sensing, 839904-839904-8, 2012
Object recognition using deep convolutional neural networks with complete transfer and partial frozen layers
MC Kruithof, H Bouma, NM Fischer, K Schutte
Optics and Photonics for Counterterrorism, Crime Fighting, and Defence XII …, 2016
Requirements for multimedia metadata schemes in surveillance applications for security
J van Rest, FA Grootjen, M Grootjen, R Wijn, O Aarts, ML Roelofs, ...
Multimedia Tools and Applications 70 (1), 573-598, 2014
Behavioral profiling in CCTV cameras by combining multiple subtle suspicious observations of different surveillance operators
H Bouma, J Vogels, O Aarts, C Kruszynski, R Wijn, G Burghouts
SPIE Defense, Security, and Sensing, 87451A-87451A-9, 2013
Fast and accurate Gaussian derivatives based on B-splines
H Bouma, A Vilanova, JO Bescós, BM ter Haar Romeny, FA Gerritsen
International Conference on Scale Space and Variational Methods in Computer …, 2007
Unbiased vessel-diameter quantification based on the FWHM criterion
H Bouma, JO Bescós, A Vilanova, FA Gerritsen
Medical Imaging, 65122N-65122N-9, 2007
Threat detection in tweets with trigger patterns and contextual cues
M Spitters, PT Eendebak, DTH Worm, H Bouma
Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint …, 2014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20