Sciweavers

945 search results - page 106 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 8 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
CIVR
2009
Springer
169views Image Analysis» more  CIVR 2009»
14 years 3 months ago
Exploiting contextual data for event retrieval in surveillance video
Contextual information is vital for the robust extraction of semantic information in automated surveillance systems. We have developed a scene independent framework for the detect...
Philip Kelly, Ciarán O. Conaire, Noel E. O'...
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
14 years 2 months ago
Identifying a Company's Non-Customer Online Communities: a Proto-typology
This paper describes an exploratory, qualitative study of a process for extracting, identifying and exploiting an enterprise's implicit (less visible) web communities using l...
Edna O. F. Reid
ISBI
2008
IEEE
14 years 9 months ago
Acoustic shadows detection, application to accurate reconstruction of 3D intraoperative ultrasound
Acoustic shadows appear in ultrasound images as regions of low signal intensity after boundaries with very high acoustic impedance differences. Acoustic shadows can be viewed as i...
D. Louis Collins, Pierre Hellier, Pierre Meyer, Pi...
ASSETS
2009
ACM
13 years 6 months ago
Fall and emergency detection with mobile phones
In this demo, we present an application for mobile phones which can monitor physical activities of users and detect unexpected emergency situations such as a sudden fall or accide...
Hamed Ketabdar, Tim Polzehl