Sciweavers

2399 search results - page 424 / 480
» Avatar Information Extraction System
Sort
View
DIM
2009
ACM
15 years 8 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
126
Voted
SIGGRAPH
2010
ACM
15 years 8 months ago
Precomputed wave simulation for real-time sound propagation of dynamic sources in complex scenes
We present a method for real-time sound propagation that captures all wave effects, including diffraction and reverberation, for multiple moving sources and a moving listener in a...
Nikunj Raghuvanshi, John Snyder, Ravish Mehra, Min...
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
15 years 8 months ago
Image Mining: Issues, Frameworks and Techniques
Advances in image acquisition and storage technology have led to tremendous growth in significantly large and detailed image databases. These images, if analyzed, can reveal usefu...
Ji Zhang, Wynne Hsu, Mong-Li Lee
CSMR
1999
IEEE
15 years 8 months ago
Impact of Function Pointers on the Call Graph
Maintenance activities are made more difficult when pointers are heavily used in source code: the programmer needs to build a mental model of memory locations and of the way they ...
Giuliano Antoniol, F. Calzolari, Paolo Tonella
GIS
1999
ACM
15 years 8 months ago
Specifying Analysis Patterns for Geographic Databases on the Basis of a Conceptual Framework
Frameworks and Patterns are important instruments that enable the reuse of successful software solutions in recurrent problems. Geographic information systems, on the other hand, ...
Jugurta Lisboa Filho, Cirano Iochpe