Sciweavers

765 search results - page 119 / 153
» Detecting Anomalies and Intruders
Sort
View
ENGL
2007
103views more  ENGL 2007»
14 years 12 months ago
Fault Diagnosis of Manufacturing Processes via Genetic Algorithm Approach
—Instantaneous detection and diagnosis of various faults and break-downs in industrial processes is required to reduce production losses and damage to equipments. A solved knowle...
Stefania Gallova
TCSV
2008
174views more  TCSV 2008»
14 years 11 months ago
A Survey of Vision-Based Trajectory Learning and Analysis for Surveillance
Abstract--This paper presents a survey of trajectory-based activity analysis for visual surveillance. It describes techniques that use trajectory data to define a general set of ac...
Brendan Tran Morris, Mohan M. Trivedi
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
13 years 2 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
DATAMINE
2008
219views more  DATAMINE 2008»
14 years 12 months ago
Correlating burst events on streaming stock market data
Abstract We address the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. We follow a two-step methodology: first we iden...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...
IPSN
2003
Springer
15 years 5 months ago
Sentry-Based Power Management in Wireless Sensor Networks
This paper presents a sentry-based approach to power management in wireless sensor networks for applications such as intruder detection and tracking. To minimize average power cons...
Jonathan Hui, Zhiyuan Ren, Bruce H. Krogh