Sciweavers

1777 search results - page 188 / 356
» Surveillance Event Detection
Sort
View
101
Voted
ECBS
2005
IEEE
108views Hardware» more  ECBS 2005»
15 years 5 months ago
Interceptor Based Constraint Violation Detection
Monitoring critical events such as constraints violations is one of the key issues of Autonomic Systems. This paper presents an interceptor based approach of constraint violation ...
Qianxiang Wang, Aditya P. Mathur
126
Voted
PCM
2004
Springer
125views Multimedia» more  PCM 2004»
15 years 9 months ago
Semantic Analysis of Basketball Video Using Motion Information
Abstract. This paper presents a new method for extracting semantic information from basketball video. Our approach consists of three stages: shot and scene boundary detection, scen...
Song Liu, Haoran Yi, Liang-Tien Chia, Deepu Rajan,...
115
Voted
SRDS
2000
IEEE
15 years 8 months ago
Detection of Livelocks in Communication Protocols by Means of a Polygon Time Structure
As has been shown, the polygon time structure overcomes the main limitations of the interval time structure, and allows to verify communication protocols, in which the explicit co...
Jerzy Brzezinski, Michal Sajkowski
131
Voted
COLING
2008
15 years 5 months ago
Towards Incremental End-of-Utterance Detection in Dialogue Systems
We define the task of incremental or 0lag utterance segmentation, that is, the task of segmenting an ongoing speech recognition stream into utterance units, and present first resu...
Michaela Atterer, Timo Baumann, David Schlangen
176
Voted
ICDCS
2012
IEEE
13 years 6 months ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...