Sciweavers

403 search results - page 43 / 81
» Morphological Change Detection Algorithms for Surveillance A...
Sort
View
MOBICOM
2000
ACM
14 years 3 days ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee
CIDM
2007
IEEE
14 years 2 months ago
Incremental Local Outlier Detection for Data Streams
Outlier detection has recently become an important problem in many industrial and financial applications. This problem is further complicated by the fact that in many cases, outlie...
Dragoljub Pokrajac, Aleksandar Lazarevic, Longin J...
CIKM
2009
Springer
14 years 2 months ago
Mining frequent itemsets in time-varying data streams
Mining frequent itemsets in data streams is beneficial to many real-world applications but is also a challenging task since data streams are unbounded and have high arrival rates...
Yingying Tao, M. Tamer Özsu
CRV
2005
IEEE
219views Robotics» more  CRV 2005»
14 years 1 months ago
People Tracking using Robust Motion Detection and Estimation
Real world computer vision systems highly depend on reliable, robust retrieval of motion cues to make accurate decisions about their surroundings. In this paper, we present a simp...
Markus Latzel, Emilie Darcourt, John K. Tsotsos
ICANNGA
2009
Springer
134views Algorithms» more  ICANNGA 2009»
14 years 2 months ago
A Generative Model for Self/Non-self Discrimination in Strings
A statistical generative model is presented as an alternative to negative selection in anomaly detection of string data. We extend the probabilistic approach to binary classificat...
Matti Pöllä