3-Dimensional Video Motion Detection and Assessment (Englisch)
- Neue Suche nach: Nelson, C. L.
- Neue Suche nach: IEEE
- Neue Suche nach: Nelson, C. L.
- Neue Suche nach: Sanson, L. D.
- Neue Suche nach: IEEE
In:
Security technology
;
295-302
;
2004
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:3-Dimensional Video Motion Detection and Assessment
-
Beteiligte:
-
Kongress:38th:; International Carnahan conference, Security technology ; 2004 ; Albuquerque, NM
-
Erschienen in:Security technology ; 295-302
-
Verlag:
- Neue Suche nach: IEEE,
-
Erscheinungsdatum:01.01.2004
-
Format / Umfang:8 pages
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
38th Annual 2004 International Carnahan Conference on Security Technology| 2004
- 2
-
Copyright| 2004
- 3
-
Executive Committee Emeritus| 2004
- 5
-
Committees| 2004
- 7
-
Table of Contents| 2004
- 13
-
History Note - 39th Annual 2005 IEEE International Carnahan Conference on Security Technology| 2004
- 16
-
Author index| 2004
- 17
-
The real privacy and security implications of the USA Patriot ActKrutz, R.L. et al. | 2004
- 28
-
National Safety & Security Field Operational Test: technologies to improve security and efficiency in the hazardous materials transport industryDeLorenzo, J. / Murray, D. et al. | 2004
- 34
-
Security architecture for heterogeneous distributed computing systemsNaqvi, S. / Riguidel, M. et al. | 2004
- 42
-
Applications of video surveillance technology in airportsBlack, J.R. et al. | 2004
- 47
-
The design and testing of a portable vehicle crash barrierBuckley, N. et al. | 2004
- 56
-
Security and telecommunicationsBilbao, A. et al. | 2004
- 61
-
E-field technology updateHarman, K. / Weese, J. et al. | 2004
- 69
-
Wireless biomedical home security network - architecture and modellingVolner, R. / Lubomir, P. et al. | 2004
- 77
-
Aviation data networks: security issues and network architectureThanthry, N. / Pendse, R. et al. | 2004
- 82
-
Smart sensor integration into security networksCano, L.A. et al. | 2004
- 85
-
Managing system design requirements informationEstes, B. / Pritchard, D. et al. | 2004
- 91
-
Security technology decision tree toolPeck, L. / Trachier, G. et al. | 2004
- 99
-
Risk assessment methodology for electric power transmission, RAM-TSMBiringer, B. et al. | 2004
- 99
-
Risk Assessment Methodology for Electric Power Transmission, RAM-TBiringer, B. / IEEE et al. | 2004
- 99
-
Risk assessment methodology for electric power transmission, RAM-T/sup SM/Biringer, B. et al. | 2004
- 106
-
Security risk assessment methodology for communities (RAM-C)Jaeger, C. et al. | 2004
- 106
-
Security Risk Assessment Methology for Communities (RAM-C)Jaeger, C. / IEEE et al. | 2004
- 111
-
The development of a Security Systems Research and Test Laboratory at a universitySmith, C.L. et al. | 2004
- 116
-
Combating transnational crime: management education at the International Law Enforcement Academy (ILEA)Kromer, R.A. / Taylor, F.R. et al. | 2004
- 131
-
Biometric co-processor for an authentication system using iris biometricsLiu-Jimenez, J. / Sanchez-Reillo, R. / Sanchez-Avila, C. et al. | 2004
- 136
-
Biometric system based in the feature of hand palmRafael Diaz, M. / Travieso, C.M. / Alonso, J.B. / Ferrer, M.A. et al. | 2004
- 140
-
Anti-trojan security module for biometric authentication tasksSanchez-Reillo, R. / Liu-Jimenez, J. / Entrena, L. / Garcia-Lorenz, M. et al. | 2004
- 145
-
A human classification system for a video-acoustic detection platformIzquierdo-Fuente, A. / Villacorta-Calvo, J. / Raboso-Mateos, M. / Martines-Arribas, A. / Rodriguez-Merino, D. / del Val-Puente, L. et al. | 2004
- 153
-
Intruder detection systems for water-hatches at reservoir sitesRaj Chowdhury, / Tarr, S. et al. | 2004
- 156
-
IntelliFIBER™ Fence Sensor Installation on Alternative Fence ConstructionsMaki, M. / Brydges, A. / Labelle, J. / IEEE et al. | 2004
- 156
-
IntelliFIBER/spl trade/ fence sensor installation on alternative fence constructionsMaki, M. / Brydges, A. / Labelle, J. et al. | 2004
- 164
-
Electrified security fences - towards a security standardTarr, S. / Condon, D. et al. | 2004
- 169
-
The next generation of GUIDAR technologyHarman, K. / Hodgins, B. et al. | 2004
- 177
-
Field tests of a buried cable sensor with intruder locationCheal, J. / O'Brien, S. / Tutor, M. et al. | 2004
- 182
-
Seeing beyond the perimeter: the Advanced Exterior Sensor (AES)Ashby, R. / Pritchard, D.A. et al. | 2004
- 189
-
A typical noisy covert channel in the IP protocolHaipeng Qu, / Purui Su, / Dengguo Feng, et al. | 2004
- 193
-
Parameterization of a forgery handwritten signature verification system using SVMMartinez, L.E. / Travieso, C.M. / Alonso, J.B. / Ferrer, M.A. et al. | 2004
- 197
-
Adaptive firewall model to detect email virusesInSeon Yoo, et al. | 2004
- 199
-
An efficient anonymous scheme for computer and communication privacyRay-I Chang, / Chin-Chun Chu, / Yu-Lin Chiu, et al. | 2004
- 204
-
IEEE 802.11, OpenAir and HomeRF for 2.4 Ghz spread-spectrum wireless data communication within a metal transportation vehicleCooley, H.T. et al. | 2004
- 212
-
Elliptic curve cryptography on constraint environmentsde Miguel de Santos, M. / Sanchez-Avila, C. / Sanchez-Reillo, R. et al. | 2004
- 221
-
N bit-wise modular multiplier architecture for public key cryptographyHisakado, T. / Kobayashi, N. / Ikenaga, T. / Baba, T. / Goto, S. / Higashi, K. / Kitao, I. / Tsunoo, Y. et al. | 2004
- 226
-
Reversible and lossless data hiding with application in digital libraryChang-Lung Tsai, / Kuo-Chin Fan, / Char-Dir Chung, / Chiang Chuang, T. et al. | 2004
- 233
-
A study of the elliptic curve cryptology applies to the next generation protocolPo-Hsian, H. / Ching-Wei, C. et al. | 2004
- 239
-
Secure computing using cryptographic assurance of execution correctnessPierson, L.G. / Campbell, P.L. / Eldridge, J.M. / Robertson, P.J. / Tarman, T.D. / Witzke, E.L. et al. | 2004
- 247
-
Use of modeling and simulation to support airport securityWilson, D.L. et al. | 2004
- 252
-
Recent advances in imaging for X-ray inspection systemsEilbert, R.F. / Shuanghe Shi, et al. | 2004
- 258
-
Measuring visual abilities and visual knowledge of aviation security screenersSchwaninger, A. / Hardmeier, D. / Hofer, F. et al. | 2004
- 265
-
Aviation data networks: new avenues for flight safetyThanthry, N. / Pendse, R. et al. | 2004
- 270
-
High tech aviation security program in Africa - a model for technology transferSample, K.B. / Taylor, D.K. / Rao, E. et al. | 2004
- 278
-
Image compression techniques in the field of security technology: examples and discussionKlima, M. / Fliegel, K. et al. | 2004
- 285
-
Applying the psychoacoustic audio watermarking technique in Internet digital traditional music museum in VietnamTran Minh Triet, / Duong Anh Due, et al. | 2004
- 289
-
Integration of color and shape for detecting and tracking security breaches in airportsSangkyu Kang, / Abidi, B. / Abidi, M. et al. | 2004
- 295
-
3-dimensional video motion detection and assessmentNelson, C.L. et al. | 2004
- 303
-
Reliable and valid measures of threat detection performance in X-ray screeningHofer, F. / Schwaninger, A. et al. | 2004
- 309
-
Using biometric facial recognition for verification and identificationPretzel, A. et al. | 2004
- 318
-
Face detection from a video camera image sequenceEspinosa-Duro, V. / Faundez-Zanuy, M. / Ortega, J.A. et al. | 2004
- 321
-
Facial identification using transformed domain by SVMTravieso, C.M. / Alonso, J.B. / Ferrer, M.A. et al. | 2004
- 325
-
Fusion of visual, thermal, and range as a solution to illumination and pose restrictions in face recognitionAbidi, B. / Huq, S. / Abidi, M. et al. | 2004
- 331
-
Effects of illumination changes on the performance of Geometrix FaceVision/spl reg/ 3D FRSKukula, E.P. / Elliott, S.J. / Waupotitsch, R. / Pesenti, B. et al. | 2004
- 331
-
Effects of Illumination Changes on the Performance of Geometrix FaceVision® 3D FRSKukula, E. P. / Elliott, S. J. / Waupotitsch, R. / Pesenti, B. / IEEE et al. | 2004
- 338
-
3D facial recognition: a quantitative analysisRuss, T.D. / Koch, M.W. / Little, C.Q. et al. | 2004
- 345
-
Passive sensor system for radioisotope detection and identification at high speedsJones, C.R. / Evans, R.M. et al. | 2004
- 351
-
Novel method for the growth of high quality cadmium telluride crystals for use in X-ray and gamma-ray sensorsCantwell, B.J. / Brinkman, A.W. / Basu, A. / Robinson, M. et al. | 2004
- 355
-
The challenge of standoff explosives detectionParmeter, J.E. et al. | 2004
- 359
-
Robohound/spl trade/ remote explosives detectionBaumann, M.J. / Hunter, J.A. / Hannum, D.W. / Horton, R. et al. | 2004
- 359
-
Robohound™ Remote Explosives DetectionBaumann, M. J. / Hunter, J. A. / Hannum, D. W. / Horton, R. / IEEE et al. | 2004
- 364
-
Notes| 2004
- 370
-
[Back cover]| 2004
-
Proceedings. IEEE 38th Annual 2004 International Carnahan Conference on Security Technology (IEEE Cat. No.04CH37572)| 2004