|
[1]S. Furao, and O. Hasegawa, “An Incremental Network for Online Unsupervised Classification and Topology Learning,” Neural Networks, vol. 19, no. 1, pp. 90-106, 2006. [2]F. Bremond, E. Corvee, J. L. P. Vilchis, and M. Thonnat, “CARETAKER Project.” Online] Available: http://www-sop.inria.fr/members/Francois.Bremond/topicsText/caretakerProject.html (accessed on May 25, 2011). [3]E. Ricci, and G. Zen, “Earth Mover's Prototypes: A Convex Learning Approach for Discovering Activity Patterns in Dynamic Scenes,” in Proceedings of 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Providence, RI, USA, pp. 3225 - 3232, Jun. 2011. [4]Y. Ivanov, and A. Bobick, “Recognition of Visual Activities and Interactions by Stochastic Parsing,” IEEE Transactions on Pattern Analysis Machine Intelligence, vol. 22, no. 8, pp. 852-872, 2000. [5]D. Minnen, I. Essa, and T. Starner, “Expectation Grammars: Leveraging High-Level Expectations for Activity Recognition,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Madison, WI, USA, vol. 2, pp. 626-632, Jun. 2003. [6]“UCSD anomaly detection dataset.” Online] Available: http://www.svcl.ucsd.edu/projects/anomaly/dataset.html (accessed on April 4, 2011).
[7]A. Galata, N. Johnson, and D. Hogg, “Learning Variable Length Markov Models of Behavior,” Computer Vision and Image Understanding, vol. 81, no. 3, pp. 398-413, 2001. [8]N. Johnson, and D. Hogg, “Representation and Synthesis of Behavior Using Gaussian Mixtures,” Image and Vision Computing, vol. 20, pp. 889-894, 2002. [9]C. Stauffer, and W. E. L. Grimson, “Learning Patterns of Activity Using Real-Time Tracking,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 8, pp. 747-757, 2000. [10]D. Makris, and T. Ellis, “Path Detection in Video Surveillance,” Image Vision and Computation, vol. 20, no. 12, pp. 895-903, 2002. 11]D. Makris, and T. Ellis, “Learning Semantic Scene Models from Observing Activity in Visual Surveillance,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 35, no. 3, pp. 397-408, 2005. [12]C. Piciarelli, and G. L. Foresti, “On-Line Trajectory Clustering for Anomalous Events Detection,” Pattern Recognition Letters, vol. 27, no. 15, pp. 1835-1842, 2006. [13]F. Jiang, Y. Wu, and A. K. Katsaggelos, “Abnormal Event Detection Based on Trajectory Clustering by 2-Depth Greedy Search,” in Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Las Vegas, NV, USA, pp. 2129-2132, Mar. 2008. [14]F. Jiang, Y. Wu, and A. K. Katsaggelos, “Abnormal Event Detection from Surveillance Video by Dynamic Hierarchical Clustering,” in Proceedings of 2007 IEEE International Conference on Image Processing, San Antonio, TX, USA, vol. 5, pp. 145-148, Sep. 2007. [15]C. T. Hsieh, S. B. Hsu, C. C. Han, and K. C. Fan, “Abnormal Event Detection Using Trajectory Features,” Journal of Information Technology and Applications, vol. 5, no. 1, pp. 21-27, 2011. [16]C. Piciarelli, and C. Micheloni, “Trajectory-Based Anomalous Event Detection,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 11, pp. 1544-1554, 2008. [17]P. KaewTraKulPong, and R. Bowden, “An Improved Adaptive Background Mixture Model for Real-Time Tracking with Shadow Detection,” in Proceedings of 2nd European Workshop on Advanced Video Based Surveillance Systems (AVBS), London, UK, pp. 149-158, September 2001. [18]R. Cucchiara, C. Grana, M. Piccardi, and A. Prati, “Detecting Moving Objects, Ghosts, and Shadows in Video Streams,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 10, pp. 1337-1342, 2003. [19]“Open Source Computer Vision Library.” Online] Available: http://www.intel.com/technology/computing/opencv/ (accessed on August 14, 2011). [20]F. Fazal, E. Guraya, PY Bayle, and F. A. Cheikh, “People Tracking via a Modified CAMSHIFT Algorithm,” in Proceedings of DCABES 2009, Wuhan, China, Oct. 2009. [21]F. Shimin, G. Qing, X. Sheng, and T. Fang, "Human Tracking Based on Mean Shift and Kalman Filter," in Proceedings of the 2009 International Conference on Artificial Intelligence and Computational Intelligence (AICI'09), Chengdu, China, vol. 3, pp. 518-522, Nov. 2009. [22]G. Bishop and G. Welch, “An Introduction to the Kalman Filter,” in Universityy of Norh Carolina SIGGRAPH 2001 course notes, North Carolina, Course 8, 2001. [23]G. R. Bradski, “Computer Vision Face Tracking for Use in a Perceptual User Interface,” Intel Technology Journal, vol. 2, no.2, pp. 12-21, 1998. [24]V. Papadourakis, and A. Argyros, “Multiple Objects Tracking in the Presence of Long-Term Occlusions,” Computer Vision and Image Understanding, vol. 114, no. 7, pp. 835-846, 2010. [25] S. Furao, T. Ogura, and O. Hasegawa, “An Enhanced Self-Organizing Incremental Neural Network for Online Unsupervised Learning,” Neural Networks, vol. 20 no. 8, pp. 893-903, 2007.
|