Sciweavers

25 search results - page 5 / 5
» Real-Time Specification Inheritance Anomalies and Real-Time ...
Sort
View
ECCV
2008
Springer
14 years 7 months ago
Multi-layered Decomposition of Recurrent Scenes
Abstract. There is considerable interest in techniques capable of identifying anomalies and unusual events in busy outdoor scenes, e.g. road junctions. Many approaches achieve this...
David Mark Russell, Shaogang Gong
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 3 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
ICCV
2001
IEEE
14 years 7 months ago
BraMBLe: A Bayesian Multiple-Blob Tracker
Blob trackers have become increasingly powerful in recent years largely due to the adoption of statistical appearance models which allow effective background subtraction and robus...
Michael Isard, John MacCormick
RTCSA
2007
IEEE
13 years 11 months ago
A Continuous Query Index for Processing Queries on RFID Data Stream
RFID middleware systems collect and filter RFID streaming data gathered continuously by numerous readers to process requests from applications. These requests are called continuou...
Jaekwan Park, Bonghee Hong, ChaeHoon Ban
BMCBI
2007
145views more  BMCBI 2007»
13 years 5 months ago
The utility of MAS5 expression summary and detection call algorithms
Background: Used alone, the MAS5.0 algorithm for generating expression summaries has been criticized for high False Positive rates resulting from exaggerated variance at low inten...
Stuart D. Pepper, Emma K. Saunders, Laura E. Edwar...