A multi-dimensional linear predictor of 9-1-1 (emergency) call volumes was built and used to automatically detect emergency events. This is illustrated by analyzing the emergency ...
Hector Jasso, Tony Fountain, Chaitan Baru, William...
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
—With the advent of the new IEEE 802.11p DSRC/WAVE radios, Vehicle-to-Vehicle (V2V) communications is poised for a dramatic leap. A canonical application for these future vehicul...
Joon Ahn, Yi Wang, Bo Yu, Fan Bai, Bhaskar Krishna...
Time-series of count data are generated in many different contexts, such as web access logging, freeway traffic monitoring, and security logs associated with buildings. Since this...
In this paper, we propose a technique for detecting possible events in outdoor areas monitored by a video surveillance system. In particular, here we focus on the time spent by an...
Christian Micheloni, Lauro Snidaro, Claudio Piciar...