Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations

  • Authors:
  • B. Banks;G. Jackson;J. Helly;D. Chin;T. J. Smith;A. Schmidt;P. Brewer;R. Medd;D. Masters;A. Burger;W. K. Krebs

  • Affiliations:
  • Science Applications International Corporation (SAIC), Hawaii USA;Science Applications International Corporation (SAIC), Hawaii USA;Science Applications International Corporation (SAIC), Hawaii USA;University of Hawaii, USA;Science Applications International Corporation (SAIC), Hawaii USA;Science Applications International Corporation (SAIC), Hawaii USA;ObjectVideo, Virginia USA;Science Applications International Corporation (SAIC), Hawaii USA;Department of Homeland Security, Virginia, USA;Alion Science and Technology, Virginia, USA;Office of Naval Research, Virginia, USA

  • Venue:
  • AVSS '07 Proceedings of the 2007 IEEE Conference on Advanced Video and Signal Based Surveillance
  • Year:
  • 2007
  • Plan Recognition of Movement

    UMAP '09 Proceedings of the 17th International Conference on User Modeling, Adaptation, and Personalization: formerly UM and AH

Quantified Score

Hi-index 0.00

Visualization

Abstract

The ability to recognize humans and their activities by vision is key for a machine to interact intelligently and effortlessly with a human-inhabited environment. Because of many important applications, “Looking at People“ is currently the ...