The goal of Intelligent video surveillance systems is to efficiently extract useful information from a considerable number of videos collected by surveillance cameras by automatically detecting, tracking and recognizing objects of interest, and understanding and analyzing their activities. Video surveillance has a huge amount of applications, from public to private places. These applications require monitoring indoor and outdoor scenes. Nowadays, there are a considerable number of digital surveillance cameras collecting a huge amount of data on a daily basis. Researchers are urged to develop intelligent systems to efficiently extract and visualize useful information from this big data source. The exponential effort on the development of new algorithms and systems for video surveillance is confirmed by the amount of effort invested in projects and companies, the creation on new startups worldwide and, not less important, in the quantity and quality of the manuscripts published in a considerable number of journals and conferences worldwide. This book is an outcome of research done by several researchers who have highly contributed to the field of Video Surveillance. The main goal is to present recent advances in this important topic for the Image Processing community.
Dombrowski, B.: Potenziale und Herausforderungen des Geschäftsprozessmanagements im Enterprise 2.0 unter der Berücksichtigung der Dynamik unternehmerischer Systeme. Logos Verlag Berlin, 201 l. Douglas C. Engelbart: SRI-ARG A technical ...
In Bishop, C. M. and Frey, B. J., editors, Ninth International Workshop on Artificial Intelligence and Statistics. Society for Artificial Intelligence and Statistics. Cited on pp. 26 and 28. Silverman, B. W. (1985).
Modellgetriebene Software-Entwicklung, pp. 93–122. ... R. H. Reussner, R. Sinawski, M. Thoma, and M. Willsch, “Modellgetriebene SoftwareEntwicklung - Architekturen, Muster und Eclipse-basierte MDA,” Universität Karlsruhe (TH), Tech.
R. McDougall, J. Mauro, and B. Gregg, “Solaris (TM) Performance and Tools: DTrace and MDB Techniques for Solaris 10 and OpenSolaris (Solaris Series),” 2006. F. Eigler and R. Hat, “Problem solving with systemtap,” in Proceedings of ...
... the factorization method within the complete electrode model of impedance tomography, Inverse Problems and Imaging ... Problems, 15 (1999), pp. 413–429. [53] , The factorization method for a class of inverse elliptic problems, Math ...
... Sichere Netzwerkkommunikation: Grundlagen, Protokolle und Architekturen. First. Springer Berlin Heidelberg, 2005. R. Bless et al. “A quality-of-service signaling architecture for seamless handover support in next generation, IP-based ...
... Sichere Netzwerkkommunikation. Berlin : Springer, 2005. – ISBN 3-540-21845-9 [14] BONEH, Dan ; FRANKLIN, Matthew: Efficient Generation of Shared RSA Keys. In: Lecture Notes in Computer Science 1294 (1997), S. 425+ [15] BUNDESGERICHTSHOF ...
... Basiswissen Softwarearchitektur: Verstehen, entwerfen, wiederverwenden. Dpunkt Verlag, 1 edition. ation. Artech House Publishers. R Development Core Team (2007). R: A Language and Environment for Statistical Computing. R Foundation for ...
... Bitter Java. Bitter Java. Manning (cit. on pp. 343, 346). Tate, B., M. Clark, and B. Lee (2003). Bitter EJB. Manning Pubs Co Series. Manning (cit. on pp. 41, 343, 346). Thakkar, D., A. E. Hassan, G. Hamann, and P. Flora (2008). “A ...