In this paper, we propose a technique for detecting possible events in outdoor areas monitored by a video surveillance system. In particular, here we focus on the time spent by an...
Christian Micheloni, Lauro Snidaro, Claudio Piciar...
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
This paper describes the design and implementation of NAOS, an active rule component in the object-oriented database system 02. The contribution of this work is related to two mai...
Service based architectures are a powerful approach to meet the fast evolution of business rules and the corresponding software. An active functionality service that detects event...
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...