Sciweavers

50 search results - page 5 / 10
» Business process impact visualization and anomaly detection
Sort
View
VISUALIZATION
2003
IEEE
14 years 22 days ago
A Visual Exploration Process for the Analysis of Internet Routing Data
The Internet pervades many aspects of our lives and is becoming indispensable to critical functions in areas such as commerce, government, production and general information disse...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu
ICMCS
2007
IEEE
195views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Robust People Detection and Tracking in a Multi-Camera Indoor Visual Surveillance System
In this paper we describe the analysis component of an indoor, real-time, multi-camera surveillance system. The analysis includes: (1) a novel feature-level foreground segmentatio...
Tao Yang, Francine Chen, Don Kimber, Jim Vaughan
ICIP
2008
IEEE
14 years 9 months ago
Motion detection with false discovery rate control
Visual surveillance applications such as object identification, object tracking, and anomaly detection require reliable motion detection as an initial processing step. Such a dete...
David A. Castañon, J. Mike McHugh, Janusz K...
ISSADS
2005
Springer
14 years 29 days ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
ICNP
2009
IEEE
14 years 2 months ago
Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks
—Accurate sensing of the spectrum condition is of crucial importance to the mitigation of the spectrum scarcity problem in dynamic spectrum access (DSA) networks. Specifically, ...
Alexander W. Min, Kang G. Shin, Xin Hu