[1]International Telecommunication Union. World Telecommunication/ICT development report 2010[EB/OL].[2013-10-12].http://www.itu.int/ITU-D/ict/publications/wtdr_10/index.html
[2]LEE J G, HAN J, LI X. Trajectory outlier detection: A partition-and-detect framework [C]// ICDE2008: Proceedings of the IEEE 24th International Conference on Data Engineering. Piscataway: IEEE, 2008:140-149.
[3]LIU L, QIAO S, LIU B, et al. Efficient trajectory outlier detection algorithm based on R-tree [J]. Journal of Software, 2009, 20(9): 2426-2435.(刘良旭,乔少杰,刘宾,等.基于R-Tree的高效异常轨迹检测算法[J].软件学报,2009,20(9):2426-2435.)
[4]XIONG L, POCZOS B, SCHNEIDER J G, et al. Hierarchical probabilistic models for group anomaly detection[C]// AISTATS2011: Proceedings of the 4th International Conference on Artificial Intelligence and Statistics. Fort Lauderdale: Microtome Publishing, 2011: 789-797.
[5]OLIVA J B. Anomaly detection and modeling of trajectories[D]. Pittsburgh: Carnegie Mellon University, 2012.
[6]CHAWLA N V, BOWYER K W, HALL L O, et al. SMOTE: Synthetic minority over-sampling technique[J]. Journal of Artificial Intelligence Research, 2002,16(1): 326-331.
[7]JAIN A, NANDAKUMAR K, ROSS A. Score normalization in multimodal biometric systems [J]. Pattern Recognition, 2005, 38(12): 2270-2285.
[8]SCHOLKOPF B, SMOLA A, MULLER K R. Nonlinear component analysis as a kernel eigenvalue problem[J]. Neural Computation, 1998, 10(5): 1299-1319.
[9]BISHOP C M. Pattern recognition and machine learning [M]. New York: Springer, 2006.
[10]HAN X. The convergence of the QL algorithm and QR algorithm with shifts for symmetric tridiagonal matrix[J]. Higher School Journal of Computational Mathematics, 1995,20(2):1-5. (韩旭里.对称三对角矩阵带位移的QL方法和QR方法的收敛性[J].高等学校计算数学学报, 1995,20(2):1-5
[11]JOACHIMS T. Text categorization with support vector machines: Learning with many relevant features [M]. Berlin: Springer, 1998.
[12]PICIARELLI C, FORESTI G L. Anomalous trajectory detection using support vector machines[C]// AVSS2007: Proceedings of Advanced Video and Signal Based Surveillance. Piscataway: IEEE, 2007:153-158.
[13]Tropical Prediction Center. Atlantic tropical storm tracking by year[EB/OL].[2013-09-15]. http://weather.unisys.com/hurricane/atlantic/
[14]XU J, TAO X. One-class intrusion detection system based on KPCA space-similarity[J]. Journal of Computer Applications, 2009, 29(9):2460-2460.(徐晶,陶新民.基于KPCA空间相似度的一类入侵检测方法[J].计算机应用,2009,29(9):2460-2460.) |