Henri Bouma
Title
Cited by
Cited by
Year
Automatic detection of pulmonary embolism in CTA images
H Bouma, JJ Sonnemans, A Vilanova, FA Gerritsen
IEEE transactions on medical imaging 28 (8), 1223-1230, 2009
792009
Automatic detection of small surface targets with electro-optical sensors in a harbor environment
H Bouma, DJJ de Lange, SP van den Broek, RAW Kemp, PBW Schwering
SPIE Europe Security and Defence, 711402-711402-8, 2008
512008
Selection of negative samples and two-stage combination of multiple features for action detection in thousands of videos
GJ Burghouts, K Schutte, H Bouma, RJM den Hollander
Machine Vision and Applications 25 (1), 85-98, 2014
502014
Real-time tracking and fast retrieval of persons in multiple surveillance cameras of a shopping mall
H Bouma, J Baan, S Landsmeer, C Kruszynski, G van Antwerpen, J Dijk
SPIE Defense, Security, and Sensing, 87560A-87560A-13, 2013
422013
Re-identification of persons in multi-camera surveillance under varying viewpoints and illumination
H Bouma, S Borsboom, RJM den Hollander, SH Landsmeer, M Worring
SPIE Defense, Security, and Sensing, 83590Q-83590Q-10, 2012
332012
Recognition and localization of relevant human behavior in videos
H Bouma, G Burghouts, L de Penning, P Hanckmann, JM ten Hove, ...
SPIE Defense, Security, and Sensing, 87110B-87110B-10, 2013
262013
Instantaneous threat detection based on a semantic representation of activities, zones and trajectories
GJ Burghouts, K Schutte, RJM ten Hove, SP van den Broek, J Baan, ...
Signal, Image and Video Processing 8 (1), 191-200, 2014
232014
Tracking individuals in surveillance video of a high-density crowd
N Hu, H Bouma, M Worring
SPIE Defense, Security, and Sensing, 839909-839909-8, 2012
232012
Automatic human action recognition in a scene from visual inputs
H Bouma, P Hanckmann, JW Marck, L Penning, R den Hollander, ...
SPIE Defense, Security, and Sensing, 83880L-83880L-10, 2012
222012
Correction for the dislocation of curved surfaces caused by the PSF in 2D and 3D CT images
H Bouma, A Vilanova, LJ Van Vliet, FA Gerritsen
IEEE transactions on pattern analysis and machine intelligence 27 (9), 1501-1507, 2005
222005
A reconfigurable function array architecture for 3G and 4G wireless terminals
PM Heysters, H Bouma, J Smit, GJM Smit, PJM Havinga
Proc. World Wireless Congress, 399-405, 2002
222002
Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall
H Bouma, J Baan, GJ Burghouts, PT Eendebak, JR van Huis, J Dijk, ...
Optics and Photonics for Counterterrorism, Crime Fighting, and Defence X …, 2014
212014
Precise local blur estimation based on the first-order derivative
H Bouma, J Dijk, AWM van Eekeren
SPIE Defense, Security, and Sensing, 839904-839904-8, 2012
172012
Segmentation and wake removal of seafaring vessels in optical satellite images
H Bouma, RJ Dekker, RM Schoemaker, AA Mohamoud
SPIE Security+ Defence, 88970B-88970B-11, 2013
162013
Requirements for multimedia metadata schemes in surveillance applications for security
J van Rest, FA Grootjen, M Grootjen, R Wijn, O Aarts, ML Roelofs, ...
Multimedia Tools and Applications 70 (1), 573-598, 2014
152014
Improved action recognition by combining multiple 2D views in the bag-of-words model
G Burghouts, P Eendebak, H Bouma, JM ten Hove
2013 10th IEEE International Conference on Advanced Video and Signal Based …, 2013
152013
Discriminating small extended targets at sea from clutter and other classes of boats in infrared and visual light imagery
SP van den Broek, H Bouma, MAC Degache
Signal and Data Processing of Small Targets 2008 6969, 69690B, 2008
152008
Incremental concept learning with few training examples and hierarchical classification
H Bouma, PT Eendebak, K Schutte, G Azzopardi, GJ Burghouts
Optics and Photonics for Counterterrorism, Crime Fighting, and Defence XI …, 2015
142015
Behavioral profiling in CCTV cameras by combining multiple subtle suspicious observations of different surveillance operators
H Bouma, J Vogels, O Aarts, C Kruszynski, R Wijn, G Burghouts
SPIE Defense, Security, and Sensing, 87451A-87451A-9, 2013
142013
On the early detection of threats in the real world based on open-source information on the internet
H Bouma, O Rajadell, D Worm, C Versloot, H Wedemeijer
Information Technologies and Security, 133-144, 2012
142012
The system can't perform the operation now. Try again later.
Articles 1–20