– This paper addresses the exploitation of massive numbers of image-derived change detections. We use the term “change analysis” to emphasize the intelligence value obtained ...
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
We present an algorithm for detecting and modeling rhythmic temporal patterns from the record of an individual's computer activity, or online "presence." The model ...
The work presents the first effort to automatically annotate the semantic meanings of temporal video patterns obtained through unsupervised discovery processes. This problem is in...
Lexing Xie, Lyndon S. Kennedy, Shih-Fu Chang, Ajay...