Sciweavers

1274 search results - page 241 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
CVPR
2011
IEEE
13 years 1 months ago
Stable Multi-Target Tracking in Real-Time Surveillance Video
The majority of existing pedestrian trackers concentrate on maintaining the identities of targets, however systems for remote biometric analysis or activity recognition in surveill...
Ben Benfold and Ian Reid
BIOINFORMATICS
2010
170views more  BIOINFORMATICS 2010»
13 years 7 months ago
Joint estimation of DNA copy number from multiple platforms
DNA copy number variants (CNV) are gains and losses of segments of chromosomes, and comprise an important class of genetic variation. Recently, various microarray hybridization ba...
Nancy R. Zhang, Yasin Senbabaoglu, Jun Z. Li
RV
2010
Springer
177views Hardware» more  RV 2010»
13 years 5 months ago
Runtime Instrumentation for Precise Flow-Sensitive Type Analysis
We describe a combination of runtime information and static analysis for checking properties of complex and configurable systems. The basic idea of our approach is to 1) let the p...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
BMCBI
2006
165views more  BMCBI 2006»
13 years 7 months ago
Validation and functional annotation of expression-based clusters based on gene ontology
Background: The biological interpretation of large-scale gene expression data is one of the paramount challenges in current bioinformatics. In particular, placing the results in t...
Ralf Steuer, Peter Humburg, Joachim Selbig
TRECVID
2007
13 years 8 months ago
Determination of Shot Boundary in MPEG Videos for TRECVID 2007
TURED ABSTRACT Detection of shot boundary plays important roles in many video applications. Herein, a novel method on shot boundary detection from compressed video is proposed. Fir...
Jinchang Ren, Jianmin Jiang, Juan Chen