Главная
Study mode:
on
1
Intro
2
Overview
3
Triplet Loss Based Network
4
Quadruplet Loss Based Network
5
Diffusion Based Network
6
DCDS Based Network
7
Pipeline
8
Dominant Sets Clustering
9
Constrained Dominant Sets (CDS)
10
Auxiliary Net
11
At Testing
12
Constraint Expansion
13
Results
Description:
Explore an in-depth analysis of person re-identification techniques in this 23-minute lecture from the University of Central Florida. Delve into various network architectures, including Triplet Loss, Quadruplet Loss, and Diffusion-based approaches. Learn about the innovative Deep Constrained Dominant Sets (DCDS) method and its implementation in person re-identification tasks. Understand the concept of Dominant Sets Clustering and its constrained variant. Discover the role of Auxiliary Networks and the process of Constraint Expansion in improving re-identification accuracy. Examine the pipeline of DCDS-based networks and evaluate their performance through comprehensive results.

Deep Constrained Dominant Sets for Person Re-Identification

University of Central Florida
Add to list