Sciweavers

1777 search results - page 267 / 356
» Surveillance Event Detection
Sort
View
ICMCS
2005
IEEE
113views Multimedia» more  ICMCS 2005»
15 years 9 months ago
HMM-Based Deception Recognition from Visual Cues
Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. This research effort attempts to leverage automated systems to augment human...
Gabriel Tsechpenakis, Dimitris N. Metaxas, Mark Ad...
119
Voted
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
15 years 9 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
135
Voted
PKDD
2005
Springer
159views Data Mining» more  PKDD 2005»
15 years 9 months ago
Fast Burst Correlation of Financial Data
We examine the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. Our methodology is comprised of two steps: a burst dete...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...
CVPR
1997
IEEE
15 years 7 months ago
Multi-Modal Tracking of Faces for Video Communications
This paper describes a system which uses multiple visual processes to detect and track faces for video compression and transmission. The system is based on an architecture in whic...
James L. Crowley, François Bérard
INFOCOM
2010
IEEE
15 years 2 months ago
URCA: Pulling out Anomalies by their Root Causes
—Traffic anomaly detection has received a lot of attention over recent years, but understanding the nature of these anomalies and identifying the flows involved is still a manu...
Fernando Silveira, Christophe Diot