Sciweavers

2990 search results - page 177 / 598
» Thresholding for Change Detection
Sort
View
MM
2010
ACM
196views Multimedia» more  MM 2010»
13 years 10 months ago
Non-parametric anomaly detection exploiting space-time features
In this paper a real-time anomaly detection system for video streams is proposed. Spatio-temporal features are exploited to capture scene dynamic statistics together with appearan...
Lorenzo Seidenari, Marco Bertini
TVLSI
2002
102views more  TVLSI 2002»
13 years 9 months ago
Algorithm level re-computing using implementation diversity: a register transfer level concurrent error detection technique
Concurrent error detection (CED) based on time redundancy entails performing the normal computation and the re-computation at different times and then comparing their results. Time...
Ramesh Karri, Kaijie Wu
ICC
2009
IEEE
139views Communications» more  ICC 2009»
13 years 7 months ago
Distributed Intrusion Detection with Intelligent Network Interfaces for Future Networks
Abstract--Intrusion detection remains an important and challenging task in current and next generation networks (NGN). Emerging technologies such as multi-core processors and virtu...
Yan Luo, Ke Xiang, Jie Fan, Chunhui Zhang
IJCAI
2007
13 years 11 months ago
Detect and Track Latent Factors with Online Nonnegative Matrix Factorization
Detecting and tracking latent factors from temporal data is an important task. Most existing algorithms for latent topic detection such as Nonnegative Matrix Factorization (NMF) h...
Bin Cao, Dou Shen, Jian-Tao Sun, Xuanhui Wang, Qia...
IDA
2007
Springer
13 years 10 months ago
Anomaly detection in data represented as graphs
An important area of data mining is anomaly detection, particularly for fraud. However, little work has been done in terms of detecting anomalies in data that is represented as a g...
William Eberle, Lawrence B. Holder