2010
DOI: 10.1016/j.engappai.2009.08.002
|View full text |Cite
|
Sign up to set email alerts
|

Scenario-based query processing for video-surveillance archives

Abstract: Scenario-based querying and retrieval Visual query specification Event-based querying After-the-fact analysis a b s t r a c t Automated video surveillance has emerged as a trendy application domain in recent years, and accessing the semantic content of surveillance video has become a challenging research area. The results of a considerable amount of research dealing with automated access to video surveillance have appeared in the literature; however, significant semantic gaps in event models and content-based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…In this field, the use of intelligent techniques may contribute to solve this kind of problems and to reduce the cost associated to the security staff by semi-automating the tasks that are currently performed by them (Collins et al, 2000). Nowadays, there are non-commercial artificial systems able to infer anomalous behavior (Haritaoglu et al, 2000), to identify suspicious or lost objects (Stringa and Regazzoni, 2000), to analyze object movements (Hu et al, 2004), to recognize the gait of people (Tao et al, 2007;Xu et al, 2006), to detect crowds , or to retrieve relevant information (Saykol et al, 2010) among other abilities (see Valera and Velastin, 2005 for a detailed revision).…”
Section: Introductionmentioning
confidence: 99%
“…In this field, the use of intelligent techniques may contribute to solve this kind of problems and to reduce the cost associated to the security staff by semi-automating the tasks that are currently performed by them (Collins et al, 2000). Nowadays, there are non-commercial artificial systems able to infer anomalous behavior (Haritaoglu et al, 2000), to identify suspicious or lost objects (Stringa and Regazzoni, 2000), to analyze object movements (Hu et al, 2004), to recognize the gait of people (Tao et al, 2007;Xu et al, 2006), to detect crowds , or to retrieve relevant information (Saykol et al, 2010) among other abilities (see Valera and Velastin, 2005 for a detailed revision).…”
Section: Introductionmentioning
confidence: 99%
“…Instead of using discrete value for the weight parameter, 43,44,72,73 we control the sensitivity of interaction, though based on W = [ω i, j ], called the m × m interaction matrix, which has unity and off-diagonal at (i, j) is−ω i, j . High sensitivity of interaction between nodes i and j is achieved by setting the weight parameter ω i, j as high, and it accounts for the smoothness between neighboring nodes based on their direction similarity.…”
Section: Modeling Dynamic Attributes Of Trajectorymentioning
confidence: 99%
“…In Ref. 44, the key frames are detected based on a grid-based motion representation of the moving regions, used to detect unusual behaviors based on finite state automata. In goal-based trajectory analysis, 45 unusual behavior is detected by evaluating the explicability of the agent's trajectory with respect to known spatial goals.…”
Section: Introductionmentioning
confidence: 99%