Sciweavers

472 search results - page 35 / 95
» Taking Topic Detection From Evaluation to Practice
Sort
View
IPSN
2011
Springer
13 years 12 days ago
Localising speech, footsteps and other sounds using resource-constrained devices
While a number of acoustic localisation systems have been proposed over the last few decades, these have typically either relied on expensive dedicated microphone arrays and works...
Yukang Guo, Mike Hazas
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 9 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
ICMCS
2005
IEEE
114views Multimedia» more  ICMCS 2005»
14 years 2 months ago
On the surplus value of semantic video analysis beyond the key frame
Typical semantic video analysis methods aim for classification of camera shots based on extracted features from a single key frame only. In this paper, we sketch a video analysis...
Cees G. M. Snoek, Marcel Worring, Jan-Mark Geusebr...
ICRA
2008
IEEE
185views Robotics» more  ICRA 2008»
14 years 3 months ago
Human detection using multimodal and multidimensional features
— This paper presents a novel human detection method based on a Bayesian fusion approach using laser range data and camera images. Laser range data analysis groups data points wi...
Luciano Spinello, Roland Siegwart
TON
2008
106views more  TON 2008»
13 years 9 months ago
Statistical techniques for detecting traffic anomalies through packet header data
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastr...
Seong Soo Kim, A. L. Narasimha Reddy