Detecting Suspicious Behavior from Positional Information

This paper appeared in the Proceedings of the Workshop on Modeling Others from Observations at the International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, July 2005.

[1]  Neil C. Rowe,et al.  Multi-agent simulation for assessing massive sensor deployment , 2004 .

[2]  Michael J. Liebhaber,et al.  Naval Air Defense Threat Assessment: Cognitive Factors and Model , 2000 .

[3]  Susan Hackwood,et al.  Signal and image processing for crime control and crime prevention , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[4]  Paul E. Proctor,et al.  Practical Intrusion Detection Handbook , 2000 .

[5]  Daniel Zelterman,et al.  Bayesian Artificial Intelligence , 2005, Technometrics.

[6]  Karl M. van Meter,et al.  Terrorists / Liberators : Researching and dealing with adversary social networks 1 , 2002 .

[7]  Leonidas J. Guibas,et al.  A Distributed Algorithm for Managing Multi-target Identities in Wireless Ad-hoc Sensor Networks , 2003, IPSN.

[8]  Michael J. Brooks,et al.  Detecting suspicious background changes in video surveillance of busy scenes , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.

[9]  Richards J. Heuer,et al.  2 – Cognitive Factors in Deception and Counterdeception* , 1981 .

[10]  Jay F. Nunamaker,et al.  An exploratory study on promising cues in deception detection and application of decision tree , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[11]  Edgar H. Callaway,et al.  Wireless Sensor Networks: Architectures and Protocols , 2003 .

[12]  Sherry Marcus,et al.  Graph-based technologies for intelligence analysis , 2004, CACM.

[13]  Jim Reich,et al.  Distributed attention , 2004, SenSys '04.

[14]  Edward Y. Chang,et al.  Multi-camera spatio-temporal fusion and biased sequence-data learning for security surveillance , 2003, MULTIMEDIA '03.