Probabilistic complex event recognition: A survey

E Alevizos, A Skarlatidis, A Artikis… - ACM Computing Surveys …, 2017 - dl.acm.org
Complex event recognition (CER) applications exhibit various types of uncertainty, ranging
from incomplete and erroneous data streams to imperfect complex event patterns. We …

An evidential fusion approach for gender profiling

J Ma, W Liu, P Miller, H Zhou - Information Sciences, 2016 - Elsevier
Abstract CCTV (Closed-Circuit TeleVision) systems are broadly deployed in the present
world. To ensure in-time reaction for intelligent surveillance, it is a fundamental task for real …

Dempster–shafer theory for modeling and treating uncertainty in iot applications based on complex event processing

EDC Bezerra, AS Teles, LR Coutinho… - Sensors, 2021 - mdpi.com
The Internet of Things (IoT) has emerged from the proliferation of mobile devices and objects
connected, resulting in the acquisition of periodic event flows from different devices and …

Complex event processing over uncertain events: Techniques, challenges, and future directions

V Akila, V Govindasamy… - … on Computation of Power …, 2016 - ieeexplore.ieee.org
In the recent years, there is a massive surge in real-time data owing to the growing number
of distributed software applications that continuously generates a large volume of data …

Context-dependent combination of sensor information in Dempster–Shafer theory for BDI

S Calderwood, K McAreavey, W Liu, J Hong - Knowledge and Information …, 2017 - Springer
There has been much interest in the belief–desire–intention (BDI) agent-based model for
develo** scalable intelligent systems, eg using the AgentSpeak framework. However …

A characteristic function approach to inconsistency measures for knowledge bases

J Ma, W Liu, P Miller - … : 6th International Conference, SUM 2012, Marburg …, 2012 - Springer
Abstract Knowledge is an important component in many intelligent systems. Since items of
knowledge in a knowledge base can be conflicting, especially if there are multiple sources …

A Closed Circuit Technological Vision: On Minority Report, event detection, and enabling technologies

C Gad, LK Hansen - Surveillance & Society, 2013 - ojs.library.queensu.ca
In a combined analysis, we investigate how the movie Minority Report can inform and
nuance the vision of technological capacities that we identify in event detection literature …

An Ambiguity Aversion Framework of Security Game under Ambiguities

W Ma, X Luo, W Liu - International Joint Conference on Artificial …, 2013 - pure.qub.ac.uk
Security is a critical concern around the world. Since resources for security are always
limited, lots of interest have arisen in using game theory to handle security resource …

Acceptable costs of minimax regret equilibrium: a solution to security games with surveillance-driven probabilistic information

W Ma, K McAreavey, W Liu, X Luo - Expert Systems with Applications, 2018 - Elsevier
We extend the application of security games from offline patrol scheduling to online
surveillance-driven resource allocation. An important characteristic of this new domain is …

An evidential improvement for gender profiling

J Ma, W Liu, P Miller - … Functions: Theory and Applications: Proceedings of …, 2012 - Springer
CCTV systems are broadly deployed in the present world. To ensure in-time reaction for
intelligent surveillance, it is a fundamental task for real-world applications to determine the …