-
2
-
-
0001882616
-
Fast algorithms for miningassociation rules in large databases
-
J. B. Bocca,M. Jarke, and C. Zaniolo, editors
-
R. Agrawal and R. Srikant. Fast algorithms for miningassociation rules in large databases. In J. B. Bocca,M. Jarke, and C. Zaniolo, editors, VLDB'94.
-
VLDB'94
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
9944222821
-
Abnormal event detection for network flooding attacks
-
C.-S. Chao, Y.-X. Chen, and A.-C. Liu. Abnormal event detection for network flooding attacks. Journal of Information Science and Engineering, 20(6):1079-1091, 2004.
-
(2004)
Journal of Information Science and Engineering
, vol.20
, Issue.6
, pp. 1079-1091
-
-
Chao, C.-S.1
Chen, Y.-X.2
Liu, A.-C.3
-
5
-
-
38349155537
-
A daily behavior enabled hidden markov model for human behavior understanding
-
May
-
P.-C. Chung and C.-D. Liu. A daily behavior enabled hidden markov model for human behavior understanding. Pattern Recognition, 41(5):1572-1580, May 2008.
-
(2008)
Pattern Recognition
, vol.41
, Issue.5
, pp. 1572-1580
-
-
Chung, P.-C.1
Liu, C.-D.2
-
7
-
-
33745164643
-
Activity recognition and abnormality detection with the switching hidden semi-markov model
-
T. V. Duong, H. H. Bui, D. Q. Phung, and S. Venkatesh. Activity recognition and abnormality detection with the switching hidden semi-markov model. In CVPR '05.
-
CVPR '05
-
-
Duong, T.V.1
Bui, H.H.2
Phung, D.Q.3
Venkatesh, S.4
-
8
-
-
78649239709
-
-
June
-
A. M. Faizal, M. M. Zaki, S. Shahrin, Y. Robiah, and S. S. Rahayu. Threshold verification technique for network intrusion detection system, June 2009.
-
(2009)
Threshold Verification Technique for Network Intrusion Detection System
-
-
Faizal, A.M.1
Zaki, M.M.2
Shahrin, S.3
Robiah, Y.4
Rahayu, S.S.5
-
9
-
-
77956292246
-
Abnormal behavior detection for early warning of terrorist attack
-
X. Geng, G. Li, Y. Ye, Y. Tu, and H. Dai. Abnormal behavior detection for early warning of terrorist attack. In AI 2006: Advances in Artificial Intelligence, 2006.
-
(2006)
AI 2006: Advances in Artificial Intelligence
-
-
Geng, X.1
Li, G.2
Ye, Y.3
Tu, Y.4
Dai, H.5
-
11
-
-
84903874716
-
Real-time daily activity classication with wireless sensor networks using hidden markov model
-
J. He, H. Li, and J. Tan. Real-time daily activity classication with wireless sensor networks using hidden markov model. In EMBS '07.
-
EMBS ' 07
-
-
He, J.1
Li, H.2
Tan, J.3
-
13
-
-
33847284635
-
Recognition of emergent human behaviour in a smart home: A data mining approach
-
S. LÄuhr, G. West, and S. Venkatesh. Recognition of emergent human behaviour in a smart home: A data mining approach. Pervasive Mob. Comput., 3(2):95-116, 2007.
-
(2007)
Pervasive Mob. Comput.
, vol.3
, Issue.2
, pp. 95-116
-
-
Läuhr, S.1
West, G.2
Venkatesh, S.3
-
14
-
-
57549089453
-
Extracting spatiotemporal human activity patterns in assisted living using a home sensor network
-
D. Lymberopoulos, A. Bamis, and A. Savvides.Extracting spatiotemporal human activity patterns in assisted living using a home sensor network. In PETRA '08.
-
PETRA '08
-
-
Lymberopoulos, D.1
Bamis, A.2
Savvides, A.3
-
15
-
-
77956297671
-
Human behavioral detection and data cleaning in assisted living environment using wirless sensor networks
-
K. Park, E. Becker, J. K. Vinjumur, Z. Le, and F. Makedon. Human behavioral detection and data cleaning in assisted living environment using wirless sensor networks. In PETRA 09, 2009.
-
(2009)
PETRA 09
-
-
Park, K.1
Becker, E.2
Vinjumur, J.K.3
Le, Z.4
Makedon, F.5
-
16
-
-
35048836274
-
Activity recognition in the home using simple and ubiquitous sensors
-
E. M. Tapia, S. S. Intille, and K. Larson. Activity recognition in the home using simple and ubiquitous sensors. In Pervasive Computing, pages 158-175, 2004.
-
(2004)
Pervasive Computing
, pp. 158-175
-
-
Tapia, E.M.1
Intille, S.S.2
Larson, K.3
-
17
-
-
27744441549
-
"Shape activity" A continuous state hmm for moving/deforming shapes with application to abnormal activity detection
-
N. Vaswani, A. R. Chowdhury, and R. Chellappa. "shape activity": A continuous state hmm for moving/deforming shapes with application to abnormal activity detection. IEEE Trans. on Image Processing, 14(10):1603-1616, 2005.
-
(2005)
IEEE Trans. on Image Processing
, vol.14
, Issue.10
, pp. 1603-1616
-
-
Vaswani, N.1
Chowdhury, A.R.2
Chellappa., R.3
|