Wavelet transforms include data decompositions and reconstructions. This paper is concerned with the authenticity issues of the data decomposition, particularly for data visualiza...
Techniques for three dimensional (3D) imaging and analysis of as-built conditions of buildings are gaining acceptance in the Architecture, Engineering, and Construction (AEC) comm...
Kui Yue, Daniel Huber, Burcu Akinci, Ramesh Krishn...
RSCTC’2010 Discovery Challenge was a special event of Rough Sets and Current Trends in Computing conference. The challenge was organized in the form of an interactive on-line com...
Marcin Wojnarski, Andrzej Janusz, Hung Son Nguyen,...
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
The NameVoyager, a web-based visualization of historical trends in baby naming, has proven remarkably popular. This paper discusses the display techniques used for smooth visual e...