Sciweavers

405 search results - page 21 / 81
» Evaluation of Anomaly Detection Method Based on Pattern Reco...
Sort
View
CVPR
2007
IEEE
14 years 10 months ago
Recognizing Night Walkers Based on One Pseudoshape Representation of Gait
Gait is a promising biometric cue which can facilitate the recognition of human beings, particularly when other biometrics are unavailable. Existing work for gait recognition, how...
Daoliang Tan, Kaiqi Huang, Shiqi Yu, Tieniu Tan
ICPR
2006
IEEE
14 years 9 months ago
Online Learning of Discriminative Patterns from Unlimited Sequences of Candidates
Recent research in object recognition has demonstrated the advantages of representing objects and scenes through localized patterns such as small image templates. In this paper we...
Ilkka Autio, Jussi T. Lindgren
ITIIS
2010
172views more  ITIIS 2010»
13 years 7 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
IBPRIA
2009
Springer
13 years 6 months ago
Real-Time Motion Detection for a Mobile Observer Using Multiple Kernel Tracking and Belief Propagation
We propose a novel statistical method for motion detection and background maintenance for a mobile observer. Our method is based on global motion estimation and statistical backgro...
Marc Vivet, Brais Martínez, Xavier Binefa
ISAAC
2001
Springer
104views Algorithms» more  ISAAC 2001»
14 years 1 months ago
Algorithms for Pattern Involvement in Permutations
We consider the problem of developing algorithms for the recognition of a fixed pattern within a permutation. These methods are based upon using a carefully chosen chain or tree ...
Michael H. Albert, Robert E. L. Aldred, Mike D. At...