Sciweavers

216 search results - page 25 / 44
» Detecting Flaws and Intruders with Visual Data Analysis
Sort
View
SCVMA
2004
Springer
14 years 1 months ago
2D Motion Description and Contextual Motion Analysis: Issues and New Models
Abstract. In this paper, several important issues related to visual motion analysis are addressed with a focus on the type of motion information to be estimated and the way context...
Patrick Bouthemy
HICSS
2008
IEEE
132views Biometrics» more  HICSS 2008»
14 years 3 months ago
Monitoring of Power System Dynamic Behavior Using Characteristic Ellipsoid Method
The potential uses of the sub-second GPSsynchronized phasor data collected from various locations within an electric power system promise endless benefits for the applications tar...
Yuri V. Makarov, Carl H. Miller, Tony B. Nguyen
BMCBI
2011
13 years 3 months ago
CNV-WebStore: Online CNV Analysis, Storage and Interpretation
Background: Microarray technology allows the analysis of genomic aberrations at an ever increasing resolution, making functional interpretation of these vast amounts of data the m...
Geert Vandeweyer, Edwin Reyniers, Wim Wuyts, Liesb...
ICDAR
2009
IEEE
13 years 6 months ago
ICDAR 2009 Signature Verification Competition
Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is perfor...
Vivian L. Blankers, C. Elisa van den Heuvel, Katri...
CG
2008
Springer
13 years 8 months ago
Practical global illumination for interactive particle visualization
Particle-based simulation methods are used to model a wide range of complex phenomena and to solve time-dependent problems of various scales. Effective visualizations of the resul...
Christiaan P. Gribble, Carson Brownlee, Steven G. ...