Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/dmkdttt/HoltMMMNW07
%A Holt, Robert J.
%A Man, Hong
%A Martini, Rainer
%A Mukherjee, Iraban
%A Netravali, Ravi
%A Wang, Jing
%B Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
%D 2007
%E Dasarathy, Belur V.
%I SPIE
%K dblp
%P 657005
%T Summary of results on optimal camera placement for boundary monitoring.
%U http://dblp.uni-trier.de/db/conf/dmkdttt/dmidiadns2007.html#HoltMMMNW07
%V 6570
%@ 978-0-8194-6692-1
@inproceedings{conf/dmkdttt/HoltMMMNW07,
added-at = {2021-03-14T00:00:00.000+0100},
author = {Holt, Robert J. and Man, Hong and Martini, Rainer and Mukherjee, Iraban and Netravali, Ravi and Wang, Jing},
biburl = {https://www.bibsonomy.org/bibtex/2de6c4ad62f65daa511a5499d6c7a7368/dblp},
booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security},
crossref = {conf/dmkdttt/2007},
editor = {Dasarathy, Belur V.},
ee = {https://doi.org/10.1117/12.719139},
interhash = {dc68290f898c0afb23c7c102de3e0730},
intrahash = {de6c4ad62f65daa511a5499d6c7a7368},
isbn = {978-0-8194-6692-1},
keywords = {dblp},
pages = 657005,
publisher = {SPIE},
series = {SPIE Proceedings},
timestamp = {2024-04-10T13:38:39.000+0200},
title = {Summary of results on optimal camera placement for boundary monitoring.},
url = {http://dblp.uni-trier.de/db/conf/dmkdttt/dmidiadns2007.html#HoltMMMNW07},
volume = 6570,
year = 2007
}