Sciweavers

415 search results - page 4 / 83
» Intruders pattern identification
Sort
View
ICCV
2007
IEEE
15 years 24 days ago
Optimization Algorithms for Labeling Brain Sulci Based on Graph Matching
Graph matching techniques are widely used in pattern recognition problems such as scene description, finger print identification, or face recognition. In this paper, we put forwar...
Faguo Yang, Frithjof Kruggel
JAISE
2011
238views more  JAISE 2011»
13 years 5 months ago
A bio-inspired system model for interactive surveillance applications
Advances in computer vision and pattern recognition research are leading to video surveillance systems with improved scene analysis capabilities. However, up to now few works have ...
Alessio Dore, Matteo Pinasco, Lorenzo Ciardelli, C...
FUIN
2006
160views more  FUIN 2006»
13 years 11 months ago
Behavioral Pattern Identification Through Rough Set Modeling
This paper introduces an approach to behavioral pattern identification as a part of a study of temporal patterns in complex dynamical systems. Rough set theory introduced by Zdzisl...
Jan G. Bazan
ICPR
2006
IEEE
14 years 12 months ago
Scene Identification using Discriminative Patterns
With the proliferation of camera phones, new information retrieval applications will emerge. The image of a scene captured by a camera phone can be a query to a remote server to i...
Jean-Pierre Chevallet, Joo-Hwee Lim, Sheng Gao
ICASSP
2011
IEEE
13 years 2 months ago
Towards improving network flow watermarks using the repeat-accumulate codes
Network intruders try to hide their identity by relaying their traf c through a number of intermediate hosts, called stepping stones. Network ow watermarks have been used to detec...
Amir Houmansadr, Nikita Borisov