Sciweavers

1777 search results - page 59 / 356
» Surveillance Event Detection
Sort
View
KIVS
2007
Springer
14 years 3 months ago
A System for in-Network Anomaly Detection
Today, the Internet is used by companies frequently since it simplifies daily work, speeds up communication, and saves money. But the more popular the Internet gets the more it su...
Thomas Gamer
JAMIA
2011
68views more  JAMIA 2011»
13 years 19 hour ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
TCSV
2008
107views more  TCSV 2008»
13 years 9 months ago
Person Surveillance Using Visual and Infrared Imagery
This paper presents a methodology for analyzing multimodal and multiperspective systems for person surveillance. Using an experimental testbed consisting of two color and two infra...
Stephen J. Krotosky, Mohan M. Trivedi
DCOSS
2005
Springer
14 years 2 months ago
Analysis of Target Detection Performance for Wireless Sensor Networks
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...
COMCOM
2006
79views more  COMCOM 2006»
13 years 9 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç