Sciweavers

403 search results - page 12 / 81
» Morphological Change Detection Algorithms for Surveillance A...
Sort
View
SDM
2007
SIAM
133views Data Mining» more  SDM 2007»
13 years 9 months ago
Change-Point Detection using Krylov Subspace Learning
We propose an efficient algorithm for principal component analysis (PCA) that is applicable when only the inner product with a given vector is needed. We show that Krylov subspace...
Tsuyoshi Idé, Koji Tsuda
KDD
2004
ACM
207views Data Mining» more  KDD 2004»
14 years 8 months ago
Belief state approaches to signaling alarms in surveillance systems
Surveillance systems have long been used to monitor industrial processes and are becoming increasingly popular in public health and anti-terrorism applications. Most early detecti...
Kaustav Das, Andrew W. Moore, Jeff G. Schneider

Publication
283views
12 years 6 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
COMCOM
2006
121views more  COMCOM 2006»
13 years 7 months ago
Application of anomaly detection algorithms for detecting SYN flooding attacks
Abstract-- We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms c...
Vasilios A. Siris, Fotini Papagalou