Sciweavers

2990 search results - page 177 / 598
» Thresholding for Change Detection
Sort
View
MM
2010
ACM
196views Multimedia» more  MM 2010»
15 years 4 months ago
Non-parametric anomaly detection exploiting space-time features
In this paper a real-time anomaly detection system for video streams is proposed. Spatio-temporal features are exploited to capture scene dynamic statistics together with appearan...
Lorenzo Seidenari, Marco Bertini
TVLSI
2002
102views more  TVLSI 2002»
15 years 3 months ago
Algorithm level re-computing using implementation diversity: a register transfer level concurrent error detection technique
Concurrent error detection (CED) based on time redundancy entails performing the normal computation and the re-computation at different times and then comparing their results. Time...
Ramesh Karri, Kaijie Wu
183
Voted
ICC
2009
IEEE
139views Communications» more  ICC 2009»
15 years 1 months ago
Distributed Intrusion Detection with Intelligent Network Interfaces for Future Networks
Abstract--Intrusion detection remains an important and challenging task in current and next generation networks (NGN). Emerging technologies such as multi-core processors and virtu...
Yan Luo, Ke Xiang, Jie Fan, Chunhui Zhang
145
Voted
IJCAI
2007
15 years 5 months ago
Detect and Track Latent Factors with Online Nonnegative Matrix Factorization
Detecting and tracking latent factors from temporal data is an important task. Most existing algorithms for latent topic detection such as Nonnegative Matrix Factorization (NMF) h...
Bin Cao, Dou Shen, Jian-Tao Sun, Xuanhui Wang, Qia...
IDA
2007
Springer
15 years 3 months ago
Anomaly detection in data represented as graphs
An important area of data mining is anomaly detection, particularly for fraud. However, little work has been done in terms of detecting anomalies in data that is represented as a g...
William Eberle, Lawrence B. Holder