Sciweavers

78 search results - page 10 / 16
» Event Detection in Multilevel Secure Active Databases
Sort
View
ADBIS
2009
Springer
151views Database» more  ADBIS 2009»
15 years 4 months ago
Rule-Based Management of Schema Changes at ETL Sources
In this paper, we visit the problem of the management of inconsistencies emerging on ETL processes as results of evolution operations g at their sources. We abstract Extract-Transf...
George Papastefanatos, Panos Vassiliadis, Alkis Si...
CORR
2010
Springer
109views Education» more  CORR 2010»
14 years 9 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
ICMCS
2009
IEEE
189views Multimedia» more  ICMCS 2009»
14 years 7 months ago
Efficient human action recognition by luminance field trajectory and geometry information
In recent years the video event understanding is an active research topic, with many applications in surveillance, security, and multimedia search and mining. In this paper we foc...
Haomian Zheng, Zhu Li, Yun Fu

Publication
283views
13 years 8 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
ICDE
2006
IEEE
167views Database» more  ICDE 2006»
15 years 11 months ago
Better Burst Detection
A burst is a large number of events occurring within a certain time window. As an unusual activity, it's a noteworthy phenomenon in many natural and social processes. Many da...
Xin Zhang, Dennis Shasha