Surveillance/Attributions: Difference between revisions

No edit summary
No edit summary
Line 3: Line 3:
Licence: © 2010 AbuHmed et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br>  
Licence: © 2010 AbuHmed et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br>  


<br>


 
Artikis, A. Paliouras, G. (2009). 'A Logic Programming Approach to Behaviour Recognition.' ''eprint arXiv.org''. 0905.4614. 5, 2009.&nbsp;[http://arxiv.org/abs/0905.4614v1 http://arxiv.org/abs/0905.4614v1]  
Artikis, A. Paliouras, G. (2009). 'A Logic Programming Approach to Behaviour Recognition.' ''eprint arXiv.org''. 0905.4614. 5, 2009.&nbsp;[http://arxiv.org/abs/0905.4614v1 http://arxiv.org/abs/0905.4614v1]


Licence: © 2009 Artikis et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br>  
Licence: © 2009 Artikis et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br>  


 
<br>


Benabbas, Y., Ihaddadene, N. and Djeraba, C.(2011) “Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance,” ''EURASIP Journal on Image and Video Processing'', vol. 2011, Article ID 163682, 4, 2011. [http://www.hindawi.com/journals/ivp/2011/163682/ doi:10.1155/2011/163682]  
Benabbas, Y., Ihaddadene, N. and Djeraba, C.(2011) “Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance,” ''EURASIP Journal on Image and Video Processing'', vol. 2011, Article ID 163682, 4, 2011. [http://www.hindawi.com/journals/ivp/2011/163682/ doi:10.1155/2011/163682]  
Line 37: Line 37:
Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010.&nbsp;[http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 doi:10.1371/journal.pone.0011233]  
Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010.&nbsp;[http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 doi:10.1371/journal.pone.0011233]  


Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
 
 
 
Pushpavathi, TP. Selvarani, R. Shahsi Kumar, NR. (2010). 'GPRS video Streaming Surveillance System GVSS.' ''eprint arXiv.org'' 1002.3011. 2, 2010.&nbsp;[http://arxiv.org/abs/1002.3011v1 http://arxiv.org/abs/1002.3011v1]
 
Licence: © 2010 Pushpavathi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Revision as of 15:52, 21 August 2011

AbuHmed, T. Mohaisen, A. Nyang, D. (2008). 'A Survey on Deep Packet Inspection for Intrusion Detection Systems.' eprint arXiv.org. 0803.0037, 3, 2008. http://arxiv.org/abs/0803.0037v1

Licence: © 2010 AbuHmed et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Artikis, A. Paliouras, G. (2009). 'A Logic Programming Approach to Behaviour Recognition.' eprint arXiv.org. 0905.4614. 5, 2009. http://arxiv.org/abs/0905.4614v1

Licence: © 2009 Artikis et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Benabbas, Y., Ihaddadene, N. and Djeraba, C.(2011) “Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance,” EURASIP Journal on Image and Video Processing, vol. 2011, Article ID 163682, 4, 2011. doi:10.1155/2011/163682

Licence: © 2011 Benabbas et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


De Nardi, R. Holland, O. (2007). 'SwarMav: A Swarm of Miniature Aerial Vehicles.' Conference Presentation. Cogprints. 5569. 5, 2007. http://cogprints.org/5569/

Licence: © 2007 De Nardi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Gayo-Avello, D. (2010). 'All liaisons are dangerous when all your friends are known to us.' eprint arXiv.org. 1012.5913, 12, 2010. http://arxiv.org/abs/1012.5913

Licence: © 2010 Gayo-Avello. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Kholghi, M. Keyvanpour, M. (2011). 'An analytical framework for data stream mining techniques based on challenges and requirements.' eprint arXiv.org. 1105.1950, 5, 2011. http://arxiv.org/abs/1105.1950

Licence: © 2011 Khoglhi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010. doi:10.1371/journal.pone.0011233

Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Pushpavathi, TP. Selvarani, R. Shahsi Kumar, NR. (2010). 'GPRS video Streaming Surveillance System GVSS.' eprint arXiv.org 1002.3011. 2, 2010. http://arxiv.org/abs/1002.3011v1

Licence: © 2010 Pushpavathi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.