Sciweavers

641 search results - page 80 / 129
» Collusion set detection using graph clustering
Sort
View
ICMI
2010
Springer
172views Biometrics» more  ICMI 2010»
13 years 6 months ago
Modelling and analyzing multimodal dyadic interactions using social networks
Social network analysis became a common technique used to model and quantify the properties of social interactions. In this paper, we propose an integrated framework to explore th...
Sergio Escalera, Petia Radeva, Jordi Vitrià...
ISMAR
2007
IEEE
14 years 3 months ago
Real-Time Object Tracking for Augmented Reality Combining Graph Cuts and Optical Flow
We present an efficient and accurate object tracking algorithm based on the concept of graph cut segmentation. The ability to track visible objects in real-time provides an inval...
Jonathan Mooser, Suya You, Ulrich Neumann
WISTP
2010
Springer
14 years 3 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
CISS
2008
IEEE
13 years 9 months ago
Detection of anomalous meetings in a social network
Abstract-- When monitoring interactions within a social network, meetings or contacts between different members of the network are recorded. This paper addresses the problem of usi...
Jorge Silva, Rebecca Willett
ICIP
2003
IEEE
14 years 10 months ago
Quadruped gait analysis using sparse motion information
In this paper we propose a system that recognises gait and quadruped structure from a sparse set of tracked points. In this work the motion information is derived from dynamic wil...
David P. Gibson, Neill W. Campbell, Barry T. Thoma...