Sciweavers

4155 search results - page 713 / 831
» External Memory Algorithms
Sort
View
ICDM
2008
IEEE
146views Data Mining» more  ICDM 2008»
14 years 4 months ago
Isolation Forest
Most existing model-based approaches to anomaly detection construct a profile of normal instances, then identify instances that do not conform to the normal profile as anomalies...
Fei Tony Liu, Kai Ming Ting, Zhi-Hua Zhou
ICIP
2008
IEEE
14 years 4 months ago
Motion detection with an unstable camera
Fast and accurate motion detection in the presence of camera jitter is known to be a difficult problem. Existing statistical methods often produce abundant false positives since ...
Pierre-Marc Jodoin, Janusz Konrad, Venkatesh Salig...
ICMCS
2008
IEEE
139views Multimedia» more  ICMCS 2008»
14 years 4 months ago
Low-complexity asymmetric multiview video coding
Multiview video coding (MVC) is currently under development by the Joint Video Team (JVT) as an extension to Advanced Video Coding (H264/AVC). Based on the suppression theory in b...
Ying Chen, Shujie Liu, Ye-Kui Wang, Miska M. Hannu...
IISWC
2008
IEEE
14 years 4 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
IJCNN
2008
IEEE
14 years 4 months ago
Hybrid learning architecture for unobtrusive infrared tracking support
—The system architecture presented in this paper is designed for helping an aged person to live longer independently in their own home by detecting unusual and potentially hazard...
K. K. Kiran Bhagat, Stefan Wermter, Kevin Burn