Sciweavers

216 search results - page 41 / 44
» Detecting Flaws and Intruders with Visual Data Analysis
Sort
View
CPM
2005
Springer
109views Combinatorics» more  CPM 2005»
14 years 1 months ago
Using PQ Trees for Comparative Genomics
Permutations on strings representing gene clusters on genomes have been studied earlier in [18, 14, 3, 12, 17] and the idea of a maximal permutation pattern was introduced in [12]....
Gad M. Landau, Laxmi Parida, Oren Weimann
ICIP
2010
IEEE
13 years 6 months ago
Acquiring shaking-free route panorama by stationary blurring
This work obtains shaking-free route panoramas from a vehicle borne camera. We detect the shaking and waving profile of the camera and rectify a long route panorama automatically ...
Hongyuan Cai, Jiang Yu Zheng, Hiromi T. Tanaka
WWW
2011
ACM
13 years 3 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...
EWSN
2009
Springer
14 years 3 months ago
SCOPES: Smart Cameras Object Position Estimation System
In this paper we present SCOPES, a distributed Smart Camera Object Position Estimation sensor network System that provides maps of distribution of people in indoors environments. ...
Ankur Kamthe, Lun Jiang, Matthew Dudys, Alberto Ce...
WCRE
1999
IEEE
14 years 21 days ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...