They Think, Talk, Act

Franklin, Clifford
November 2005
Security: Solutions for Enterprise Security Leaders;Nov2005, Vol. 42 Issue 11, p41
Trade Publication
Focuses on the addition of intelligent systems and video analytics in surveillance systems. Efficiency of the intelligent surveillance systems; Features and capabilities of the system; Benefits of the system on business; Programming technique commonly used in the system.


Related Articles

  • HW-SW Framework for Multimedia Applications on MPSoC: Practice and Experience. Liu Yan; Li Renfa; Xu Cheng; Yu Fei // Journal of Computers;Mar2009, Vol. 4 Issue 3, p238 

    Constructing a intelligence surveillance system using embedded video server requires a sophisticated hardware/software framework for this system, and it should consider the performance, cost and energy/power consumption constrains. This paper discusses the design and implementation of an...

  • PART ONE SURVEILLANCE NATION. Farmer, Dan; Mann, Charles C. // Technology Review;Apr2003, Vol. 106 Issue 3, p34 

    Discusses the impact of electronic surveillance systems on the society. Application of video-surveillance systems in law enforcement; Forecast on the growth of surveillance systems; Problems with surveillance systems; Overview of government programs to integrate information on citizens and...

  • DESIGNING THE ARCHITECTURE OF A SCALABLE VIDEO SURVEILLANCE SYSTEM. KRISTALY, Dominic Mircea; SISAK, Francisc; GRIGORESCU, Costin Marius; CARAMAN, Mihai Claudiu // Annals of DAAAM & Proceedings;Jan2009, p1677 

    There are many video surveillance systems on the market, from relatively cheap to extremely expansive, each running its own software and having its own user interface, but offering similar features (at different quality levels). Each of the producers of video surveillance systems provides its...

  • Some Inference Rules for Integer Arithmetic for Verification of Flowchart Programs on Integers. Sarkar, D.; De Sarkar, S. C. // IEEE Transactions on Software Engineering;Jan89, Vol. 15 Issue 1, p1 

    At the heart of any program verifier lies a theorem prover which proves theorems over the domain of the program. For any meaningful program, the theorems encountered are quite complex. The problem, which is equivalent to the validity problem of second-order logic, reduces to that of first-order...

  • An Efficient Fast Pruned Parallel Algorithm for finding Longest Common Subsequences in BioSequences. Eswaran, Sumathy; RajaGopalan, S. P. // Annals. Computer Science Series;2010, Vol. 8 Issue 1, p137 

    This paper presents an Efficient and fast approach to identify the Longest Common Subsequence between Biosequences. Identifying Longest Common Subsequence between two or more biosequences is an important problem in computer science due to its complexity and applicability to the field of biology....

  • A Unified Interprocedural Program Representation for a Maintenance Environment. Harrold, Mary Jean; Malloy, Brian // IEEE Transactions on Software Engineering;Jun93, Vol. 19 Issue 6, p584 

    Modifying and then validating a program with many interacting modules, such as procedures, is an expensive and complex task: maintenance activities must be performed for changed procedures and for those procedures that directly or indirectly interact with the changed procedure. The problem is...

  • Multi-core Programming Model based on Aspect-Oriented Programming. Li Tong // Applied Mechanics & Materials;2014, Issue 556-562, p6175 

    Amount of legacy systems in early stages are fall behind multi-core ages, and these legacy systems were designed for single processor which can not expand the computing power of the multi-core hardware. In this paper, we employ aspect oriented programming technology and design the crosscutting...

  • Compact Routing Schemes for Dynamic Ring Networks. Krizanc, Danny; Luccio, Flaminia L.; Raman, Rajeev // Theory of Computing Systems;Sep/Oct2004, Vol. 37 Issue 5, p585 

    We consider the problem of routing in an asynchronous dynamically changing ring of processors using schemes that minimize the storage space for the routing information. In general, applying static techniques to a dynamic network would require significant re-computation. Moreover, the known...

  • Simple Collaboration Eavesdropping on the Improved Multiparty Quantum Secret Sharing Protocol. Gan Gao // International Journal of Theoretical Physics;Sep2010, Vol. 49 Issue 9, p2210 

    We propose a new attack strategy for the improvement n-party ( n≥4) case [S. Lin, F. Gao, Q.Y. Wen, F.C. Zhu in Opt. Commun. 281:4553, ] of the multiparty quantum secret sharing protocol [Z.J. Zhang, G. Gao, X. Wang, L.F. Han, S.H. Shi in Opt. Commun. 269:418, ]. Our attack strategy is an...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics