Detecting Suspicious Behavior from Positional Information
暂无分享,去创建一个
[1] Neil C. Rowe,et al. Multi-agent simulation for assessing massive sensor deployment , 2004 .
[2] Michael J. Liebhaber,et al. Naval Air Defense Threat Assessment: Cognitive Factors and Model , 2000 .
[3] Susan Hackwood,et al. Signal and image processing for crime control and crime prevention , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[4] Paul E. Proctor,et al. Practical Intrusion Detection Handbook , 2000 .
[5] Daniel Zelterman,et al. Bayesian Artificial Intelligence , 2005, Technometrics.
[6] Karl M. van Meter,et al. Terrorists / Liberators : Researching and dealing with adversary social networks 1 , 2002 .
[7] Leonidas J. Guibas,et al. A Distributed Algorithm for Managing Multi-target Identities in Wireless Ad-hoc Sensor Networks , 2003, IPSN.
[8] Michael J. Brooks,et al. Detecting suspicious background changes in video surveillance of busy scenes , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.
[9] Richards J. Heuer,et al. 2 – Cognitive Factors in Deception and Counterdeception* , 1981 .
[10] Jay F. Nunamaker,et al. An exploratory study on promising cues in deception detection and application of decision tree , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[11] Edgar H. Callaway,et al. Wireless Sensor Networks: Architectures and Protocols , 2003 .
[12] Sherry Marcus,et al. Graph-based technologies for intelligence analysis , 2004, CACM.
[13] Jim Reich,et al. Distributed attention , 2004, SenSys '04.
[14] Edward Y. Chang,et al. Multi-camera spatio-temporal fusion and biased sequence-data learning for security surveillance , 2003, MULTIMEDIA '03.