Sciweavers

990 search results - page 137 / 198
» An efficient data structure for network anomaly detection
Sort
View
JEI
2008
109views more  JEI 2008»
13 years 6 months ago
New approach for liveness detection in fingerprint scanners based on valley noise analysis
Recent research has shown that it is possible to spoof a variety of fingerprint scanners using some simple techniques with molds made from plastic, clay, Play-Doh, silicon, or gela...
Bozhao Tan, Stephanie A. C. Schuckers
ICCV
2009
IEEE
1363views Computer Vision» more  ICCV 2009»
15 years 29 days ago
Human Detection Using Partial Least Squares Analysis
Significant research has been devoted to detecting people in images and videos. In this paper we describe a human detection method that augments widely used edge-based features ...
William Robson Schwartz, Aniruddha Kembhavi, David...
WD
2010
13 years 5 months ago
Self-organized aggregation in irregular wireless networks
Gossip-based epidemic protocols are used to aggregate data in distributed systems. This fault-tolerant approach does neither require maintenance of any global network state nor kno...
Joanna Geibig, Dirk Bradler
BMCBI
2007
148views more  BMCBI 2007»
13 years 8 months ago
fREDUCE: Detection of degenerate regulatory elements using correlation with expression
Background: The precision of transcriptional regulation is made possible by the specificity of physical interactions between transcription factors and their cognate binding sites ...
Randy Z. Wu, Christina Chaivorapol, Jiashun Zheng,...
ICASSP
2009
IEEE
14 years 2 months ago
Fusion of fMRI, sMRI, and EEG data using canonical correlation analysis
Typically data acquired through imaging techniques such as functional magnetic resonance imaging (fMRI), structural MRI (sMRI), and electroencephalography (EEG) are analyzed separ...
Nicolle M. Correa, Yi-Ou Li, Tülay Adali, Vin...