Sciweavers

2236 search results - page 339 / 448
» Intrusion detection techniques and approaches
Sort
View
CRV
2005
IEEE
272views Robotics» more  CRV 2005»
13 years 11 months ago
Real-Time Video Surveillance with Self-Organizing Maps
In this paper, we present an approach for video surveillance involving (a) moving object detection, (b) tracking and (c) normal/abnormal event recognition. The detection step uses...
Mohamed Dahmane, Jean Meunier
LWA
2007
13 years 10 months ago
Incremental Mining for Facility Management
Modern buildings are equipped with high-tech systems that take care of several fundamental aspects, e.g., air-conditioning, heating and water supply. The requirements posed on fac...
Katja Hose, Marcel Karnstedt, Daniel Klan, Kai-Uwe...
NIPS
2001
13 years 10 months ago
Discriminative Direction for Kernel Classifiers
In many scientific and engineering applications, detecting and understanding differences between two groups of examples can be reduced to a classical problem of training a classif...
Polina Golland
JMM2
2006
133views more  JMM2 2006»
13 years 9 months ago
An Adaptive Method for Image Recovery in the DFT Domain
In image authentication research, a common approach is to divide a given image into a number of smaller blocks, and embed a fragile watermark into each block. The modifications can...
Peining Tao, Ahmet M. Eskicioglu
JUCS
2006
146views more  JUCS 2006»
13 years 9 months ago
Health Monitoring and Assistance to Support Aging in Place
: To many people, home is a sanctuary. For those people who need special medical care, they may need to be pulled out of their home to meet their medical needs. As the population a...
Diane J. Cook