Sciweavers

91 search results - page 18 / 19
» Feature Construction Scheme for Efficient Intrusion Detectio...
Sort
View
IVC
2008
223views more  IVC 2008»
13 years 6 months ago
Euclidean path modeling for video surveillance
In this paper, we address the issue of Euclidean path modeling in a single camera for activity monitoring in a multi-camera video surveillance system. The method consists of a pat...
Imran N. Junejo, Hassan Foroosh
SIGSOFT
2009
ACM
14 years 6 months ago
SCA: a semantic conflict analyzer for parallel changes
Parallel changes are becoming increasingly prevalent in the development of large scale software system. To further study the relationship between parallel changes and faults, we h...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
CVPR
2007
IEEE
14 years 8 months ago
Towards Scalable Representations of Object Categories: Learning a Hierarchy of Parts
This paper proposes a novel approach to constructing a hierarchical representation of visual input that aims to enable recognition and detection of a large number of object catego...
Sanja Fidler, Ales Leonardis
CVPR
2009
IEEE
13 years 10 months ago
Keypoint induced distance profiles for visual recognition
We show that histograms of keypoint descriptor distances can make useful features for visual recognition. Descriptor distances are often exhaustively computed between sets of keyp...
Tat-Jun Chin, David Suter
INFOCOM
2006
IEEE
14 years 5 days ago
Backbone Topology Synthesis for Multi-Radio Meshed Wireless LANs
—Wireless local area network (WLAN) systems are widely implemented today to provide hot spot coverage. Operated typically in an infrastructure mode, each WLAN is managed by an ac...
Laura Huei-jiun Ju, Izhak Rubin