Sciweavers

216 search results - page 21 / 44
» Detecting Flaws and Intruders with Visual Data Analysis
Sort
View
VCBM
2010
13 years 2 months ago
Guided Visualization of Ultrasound Image Sequences
Ultrasonography allows informative and expressive real time examinations of patients. Findings are usually reported as printouts, screen shots and video sequences. However, in cer...
Paolo Angelelli, Ivan Viola, Kim Nylund, Odd Helge...
ICMCS
2006
IEEE
149views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Semantic 3D Face Mesh Simplification for Transmission and Visualization
Three-dimensional data generated from range scanners is usually composed of a huge amount of information. Simplification and compression techniques must be adopted in order to red...
Alessandro Colombo, Claudio Cusano, Raimondo Schet...
CVPR
2006
IEEE
14 years 9 months ago
Fusion of Detection and Matching Based Approaches for Laser Based Multiple People Tracking
Most of visual tracking algorithms have been achieved by matching-based searching strategies or detection-based data association algorithms. In this paper, our objective is to ana...
Jinshi Cui, Huijing Zhao, Ryosuke Shibasaki
ISBI
2008
IEEE
14 years 8 months ago
An information-based clustering approach for fMRI activation detection
Most clustering algorithms in fMRI analysis implicitly require some nontrivial assumption on data structure. Due to arbitrary distribution of fMRI time series in the temporal doma...
Lijun Bai, Wei Qin, Jimin Liang, Jie Tian
JSAC
2006
165views more  JSAC 2006»
13 years 7 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy