Sciweavers

121 search results - page 6 / 25
» Anomalous trajectory patterns detection
Sort
View
ICPR
2008
IEEE
14 years 2 months ago
Invariant visual patterns for video copy detection
Large scale video copy detection task requires compact feature insensitive to various copy changes. Based on local feature trajectory behavior we discover invariant visual pattern...
Xiao Wu, Yongdong Zhang, Yufeng Wu, Junbo Guo, Jin...
GW
2009
Springer
136views Biometrics» more  GW 2009»
13 years 5 months ago
Multiscale Detection of Gesture Patterns in Continuous Motion Trajectories
Abstract. We describe a numerical method for scale invariant detection of gesture patterns in continuous 2D motions. The algorithm is fast due to our rejection-based reasoning achi...
Radu-Daniel Vatavu, Laurent Grisoni, Stefan Gheorg...
JMLR
2010
163views more  JMLR 2010»
13 years 2 months ago
Detection of Server-side Web Attacks
Web servers and server-side applications constitute the key components of modern Internet services. We present a pattern recognition system to the detection of intrusion attempts ...
Igino Corona, Giorgio Giacinto
FLAIRS
2009
13 years 5 months ago
Discovering Anomalies to Multiple Normative Patterns in Structural and Numeric Data
One of the primary issues with traditional anomaly detection approaches is their inability to handle complex, structural data. One approach to this issue involves the detection of...
William Eberle, Lawrence B. Holder
RAID
1999
Springer
14 years 1 days ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen