Sciweavers

216 search results - page 22 / 44
» Detecting Flaws and Intruders with Visual Data Analysis
Sort
View
ICSM
2008
IEEE
14 years 1 months ago
Query-based filtering and graphical view generation for clone analysis
Code clones are similar program structures recurring in software systems. Clone detectors produce much information and a challenge is to identify useful clones depending on the go...
Yali Zhang, Hamid Abdul Basit, Stan Jarzabek, Dang...
PST
2008
13 years 8 months ago
LogView: Visualizing Event Log Clusters
Event logs or log files form an essential part of any network management and administration setup. While log files are invaluable to a network administrator, the vast amount of dat...
Adetokunbo Makanju, Stephen Brooks, A. Nur Zincir-...
CGF
2008
165views more  CGF 2008»
13 years 7 months ago
Visual Inspection of Multivariate Graphs
Most graph visualization techniques focus on the structure of graphs and do not offer support for dealing with node attributes and edge labels. To enable users to detect relations...
A. Johannes Pretorius, Jarke J. van Wijk
ISBI
2004
IEEE
14 years 8 months ago
Nonlinear Dimension Reduction of fMRI Data: The Laplacian Embedding Approach
In this paper, we introduce the use of nonlinear dimension reduction for the analysis of functional neuroimaging datasets. Using a Laplacian Embedding approach, we show the power ...
Olivier D. Faugeras, Bertrand Thirion
3DPVT
2006
IEEE
247views Visualization» more  3DPVT 2006»
13 years 11 months ago
Contour-Based Object Detection in Range Images
This paper presents a novel object recognition approach based on range images. Due to its insensitivity to illumination, range data is well suited for reliable silhouette extracti...
Stefan Stiene, Kai Lingemann, Andreas Nüchter...