Probabilistic complex event recognition: A survey
Complex event recognition (CER) applications exhibit various types of uncertainty, ranging
from incomplete and erroneous data streams to imperfect complex event patterns. We …
from incomplete and erroneous data streams to imperfect complex event patterns. We …
An evidential fusion approach for gender profiling
Abstract CCTV (Closed-Circuit TeleVision) systems are broadly deployed in the present
world. To ensure in-time reaction for intelligent surveillance, it is a fundamental task for real …
world. To ensure in-time reaction for intelligent surveillance, it is a fundamental task for real …
Dempster–shafer theory for modeling and treating uncertainty in iot applications based on complex event processing
The Internet of Things (IoT) has emerged from the proliferation of mobile devices and objects
connected, resulting in the acquisition of periodic event flows from different devices and …
connected, resulting in the acquisition of periodic event flows from different devices and …
Complex event processing over uncertain events: Techniques, challenges, and future directions
V Akila, V Govindasamy… - … on Computation of Power …, 2016 - ieeexplore.ieee.org
In the recent years, there is a massive surge in real-time data owing to the growing number
of distributed software applications that continuously generates a large volume of data …
of distributed software applications that continuously generates a large volume of data …
Context-dependent combination of sensor information in Dempster–Shafer theory for BDI
There has been much interest in the belief–desire–intention (BDI) agent-based model for
develo** scalable intelligent systems, eg using the AgentSpeak framework. However …
develo** scalable intelligent systems, eg using the AgentSpeak framework. However …
A characteristic function approach to inconsistency measures for knowledge bases
J Ma, W Liu, P Miller - … : 6th International Conference, SUM 2012, Marburg …, 2012 - Springer
Abstract Knowledge is an important component in many intelligent systems. Since items of
knowledge in a knowledge base can be conflicting, especially if there are multiple sources …
knowledge in a knowledge base can be conflicting, especially if there are multiple sources …
A Closed Circuit Technological Vision: On Minority Report, event detection, and enabling technologies
In a combined analysis, we investigate how the movie Minority Report can inform and
nuance the vision of technological capacities that we identify in event detection literature …
nuance the vision of technological capacities that we identify in event detection literature …
An Ambiguity Aversion Framework of Security Game under Ambiguities
Security is a critical concern around the world. Since resources for security are always
limited, lots of interest have arisen in using game theory to handle security resource …
limited, lots of interest have arisen in using game theory to handle security resource …
Acceptable costs of minimax regret equilibrium: a solution to security games with surveillance-driven probabilistic information
We extend the application of security games from offline patrol scheduling to online
surveillance-driven resource allocation. An important characteristic of this new domain is …
surveillance-driven resource allocation. An important characteristic of this new domain is …
An evidential improvement for gender profiling
J Ma, W Liu, P Miller - … Functions: Theory and Applications: Proceedings of …, 2012 - Springer
CCTV systems are broadly deployed in the present world. To ensure in-time reaction for
intelligent surveillance, it is a fundamental task for real-world applications to determine the …
intelligent surveillance, it is a fundamental task for real-world applications to determine the …