Skip to main content

Showing 1–5 of 5 results for author: Sartipi, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2011.09594  [pdf, other

    cs.CV cs.RO

    Deep Multi-view Depth Estimation with Predicted Uncertainty

    Authors: Tong Ke, Tien Do, Khiem Vuong, Kourosh Sartipi, Stergios I. Roumeliotis

    Abstract: In this paper, we address the problem of estimating dense depth from a sequence of images using deep neural networks. Specifically, we employ a dense-optical-flow network to compute correspondences and then triangulate the point cloud to obtain an initial depth map.Parts of the point cloud, however, may be less accurate than others due to lack of common observations or small parallax. To further i… ▽ More

    Submitted 27 March, 2021; v1 submitted 18 November, 2020; originally announced November 2020.

    Comments: IEEE International Conference on Robotics and Automation (ICRA 2021)

  2. arXiv:2008.00092  [pdf, other

    cs.CV

    Deep Depth Estimation from Visual-Inertial SLAM

    Authors: Kourosh Sartipi, Tien Do, Tong Ke, Khiem Vuong, Stergios I. Roumeliotis

    Abstract: This paper addresses the problem of learning to complete a scene's depth from sparse depth points and images of indoor scenes. Specifically, we study the case in which the sparse depth is computed from a visual-inertial simultaneous localization and mapping (VI-SLAM) system. The resulting point cloud has low density, it is noisy, and has non-uniform spatial distribution, as compared to the input f… ▽ More

    Submitted 14 August, 2020; v1 submitted 31 July, 2020; originally announced August 2020.

    Comments: 9 pages

  3. arXiv:2007.11956  [pdf, other

    cs.CR cs.LG

    Detecting the Insider Threat with Long Short Term Memory (LSTM) Neural Networks

    Authors: Eduardo Lopez, Kamran Sartipi

    Abstract: Information systems enable many organizational processes in every industry. The efficiencies and effectiveness in the use of information technologies create an unintended byproduct: misuse by existing users or somebody impersonating them - an insider threat. Detecting the insider threat may be possible if thorough analysis of electronic logs, capturing user behaviors, takes place. However, logs ar… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

  4. arXiv:2006.04748  [pdf, other

    cs.CY cs.LG q-bio.QM

    Serverless on FHIR: Deploying machine learning models for healthcare on the cloud

    Authors: Bell Raj Eapen, Kamran Sartipi, Norm Archer

    Abstract: Machine Learning (ML) plays a vital role in implementing digital health. The advances in hardware and the democratization of software tools have revolutionized machine learning. However, the deployment of ML models -- the mathematical representation of the task to be performed -- for effective and efficient clinical decision support at the point of care is still a challenge. ML models undergo cons… ▽ More

    Submitted 8 June, 2020; originally announced June 2020.

    Comments: 10 pages, 1 figure

  5. arXiv:2003.13519  [pdf, ps, other

    cs.CL cs.LG

    QRMine: A python package for triangulation in Grounded Theory

    Authors: Bell Raj Eapen, Norm Archer, Kamran Sartipi

    Abstract: Grounded theory (GT) is a qualitative research method for building theory grounded in data. GT uses textual and numeric data and follows various stages of coding or tagging data for sense-making, such as open coding and selective coding. Machine Learning (ML) techniques, including natural language processing (NLP), can assist the researchers in the coding process. Triangulation is the process of c… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.