Sciweavers

376 search results - page 19 / 76
» Visual Detection of Design Anomalies
Sort
View
ICIP
2008
IEEE
14 years 9 months ago
Motion detection with false discovery rate control
Visual surveillance applications such as object identification, object tracking, and anomaly detection require reliable motion detection as an initial processing step. Such a dete...
David A. Castañon, J. Mike McHugh, Janusz K...
ECCV
2010
Springer
13 years 11 months ago
Anomalous Behaviour Detection using Spatiotemporal Oriented Energies, Subset Inclusion Histogram Comparison and Event-Driven Pro
Abstract. This paper proposes a novel approach to anomalous behaviour detection in video. The approach is comprised of three key components. First, distributions of spatiotemporal ...
VIZSEC
2004
Springer
14 years 1 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
VL
2008
IEEE
130views Visual Languages» more  VL 2008»
14 years 2 months ago
Exploring the evolution of software quality with animated visualization
Assessing software quality and understanding how events in its evolution have lead to anomalies are two important steps toward reducing costs in software maintenance. Unfortunatel...
Guillaume Langelier, Houari A. Sahraoui, Pierre Po...
IAT
2007
IEEE
13 years 11 months ago
High-Speed Network Traffic Acquisition for Agent Systems
This paper presents a design of high-speed network traffic acquisition subsystem suitable for agent-based intrusion detection systems. To match the performance requirements and to...
Pavel Celeda, Vojtech Krmicek, Martin Rehák...