Publikation: Integrative Visual Analytics for Suspicious Behavior Detection
Lade...
Dateien
Datum
2009
Herausgeber:innen
ISSN der Zeitschrift
Electronic ISSN
ISBN
Bibliografische Daten
Verlag
Schriftenreihe
Auflagebezeichnung
URI (zitierfähiger Link)
DOI (zitierfähiger Link)
Internationale Patentnummer
Link zur Lizenz
Angaben zur Forschungsförderung
Projekt
Open Access-Veröffentlichung
Open Access Green
Core Facility der Universität Konstanz
Titel in einer weiteren Sprache
Publikationstyp
Beitrag zu einem Konferenzband
Publikationsstatus
Published
Erschienen in
2009 IEEE Symposium on Visual Analytics Science and Technology. IEEE, 2009, pp. 253-254. ISBN 978-1-4244-5283-5. Available under: doi: 10.1109/VAST.2009.5334430
Zusammenfassung
In the VAST Challenge 2009 suspicious behavior had to be detected applying visual analytics to heterogeneous data, such as network traffic, social network enriched with geo-spatial attributes, and finally video surveillance data. This paper describes some of the awarded parts from our solution entry.
Zusammenfassung in einer weiteren Sprache
Fachgebiet (DDC)
004 Informatik
Schlagwörter
Konferenz
2009 IEEE Symposium on Visual Analytics Science and Technology, 12. Okt. 2009 - 13. Okt. 2009, Atlantic City, NJ, USA
Rezension
undefined / . - undefined, undefined
Zitieren
ISO 690
BAK, Peter, Stefan KOCH, Christian ROHRDANTZ, Simon BUTSCHER, Svenja LEIFERT, Patrick JUNGK, Christoph GRANACHER, Daniel A. KEIM, 2009. Integrative Visual Analytics for Suspicious Behavior Detection. 2009 IEEE Symposium on Visual Analytics Science and Technology. Atlantic City, NJ, USA, 12. Okt. 2009 - 13. Okt. 2009. In: 2009 IEEE Symposium on Visual Analytics Science and Technology. IEEE, 2009, pp. 253-254. ISBN 978-1-4244-5283-5. Available under: doi: 10.1109/VAST.2009.5334430BibTex
@inproceedings{Bak2009-10Integ-5685, year={2009}, doi={10.1109/VAST.2009.5334430}, title={Integrative Visual Analytics for Suspicious Behavior Detection}, isbn={978-1-4244-5283-5}, publisher={IEEE}, booktitle={2009 IEEE Symposium on Visual Analytics Science and Technology}, pages={253--254}, author={Bak, Peter and Koch, Stefan and Rohrdantz, Christian and Butscher, Simon and Leifert, Svenja and Jungk, Patrick and Granacher, Christoph and Keim, Daniel A.} }
RDF
<rdf:RDF xmlns:dcterms="http://purl.org/dc/terms/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:void="http://rdfs.org/ns/void#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/5685"> <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/5685"/> <dcterms:issued>2009-10</dcterms:issued> <dc:creator>Leifert, Svenja</dc:creator> <dc:contributor>Butscher, Simon</dc:contributor> <dc:creator>Bak, Peter</dc:creator> <dc:creator>Granacher, Christoph</dc:creator> <dcterms:title>Integrative Visual Analytics for Suspicious Behavior Detection</dcterms:title> <dc:creator>Jungk, Patrick</dc:creator> <dc:contributor>Leifert, Svenja</dc:contributor> <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/5685/1/Bak_2009_IntegrativeVisual.pdf"/> <dc:creator>Koch, Stefan</dc:creator> <dc:contributor>Rohrdantz, Christian</dc:contributor> <dc:contributor>Koch, Stefan</dc:contributor> <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dc:contributor>Keim, Daniel A.</dc:contributor> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T15:59:21Z</dc:date> <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/5685/1/Bak_2009_IntegrativeVisual.pdf"/> <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/> <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T15:59:21Z</dcterms:available> <dc:contributor>Granacher, Christoph</dc:contributor> <dcterms:bibliographicCitation>First publ. in: IEEE Symposium on Visual Analytics Science and Technology (VAST) : Atlantic City, New Jersey, USA, October 12-13, 2009 : proceedings / John Stasko. -[Piscataway, N.J.] : IEEE Xplore, 2009. - pp. 253-254. - ISBN 978-1-4244-5283-5</dcterms:bibliographicCitation> <dc:creator>Rohrdantz, Christian</dc:creator> <dc:contributor>Bak, Peter</dc:contributor> <dc:language>eng</dc:language> <dc:creator>Butscher, Simon</dc:creator> <dc:format>application/pdf</dc:format> <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/> <dc:contributor>Jungk, Patrick</dc:contributor> <dc:rights>terms-of-use</dc:rights> <foaf:homepage rdf:resource="http://localhost:8080/"/> <dc:creator>Keim, Daniel A.</dc:creator> <dcterms:abstract xml:lang="eng">In the VAST Challenge 2009 suspicious behavior had to be detected applying visual analytics to heterogeneous data, such as network traffic, social network enriched with geo-spatial attributes, and finally video surveillance data. This paper describes some of the awarded parts from our solution entry.</dcterms:abstract> </rdf:Description> </rdf:RDF>
Interner Vermerk
xmlui.Submission.submit.DescribeStep.inputForms.label.kops_note_fromSubmitter
Prüfungsdatum der Dissertation
Finanzierungsart
Kommentar zur Publikation
Allianzlizenz
Corresponding Authors der Uni Konstanz vorhanden
Internationale Co-Autor:innen
Universitätsbibliographie
Ja