One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
This paper explores the issues faced in creating a sys-4 tem that can learn tactical human behavior merely by observing5 a human perform the behavior in a simulation. More specific...
A method is presented for identifying individuals by shape, given a sequence of noisy silhouettes segmented from video. A spectral partitioning framework is used to cluster similar...
Abstract--This paper proposes a no-reference quality assessment metric for digital video subject to H.264/AVC encoding. The proposed metric comprises two main steps: coding error e...
Real-time unusual event detection in video stream has been a difficult challenge due to the lack of sufficient training information, volatility of the definitions for both norm...