Sciweavers

462 search results - page 84 / 93
» Information visualization for an intrusion detection system
Sort
View
SI3D
2003
ACM
14 years 22 days ago
Incorporating dynamic real objects into immersive virtual environments
We present algorithms that enable virtual objects to interact with and respond to virtual representations, avatars, of real objects. These techniques allow dynamic real objects, s...
Benjamin Lok, Samir Naik, Mary C. Whitton, Frederi...
AUSDM
2006
Springer
124views Data Mining» more  AUSDM 2006»
13 years 11 months ago
Analyzing Harmonic Monitoring Data Using Data Mining
Harmonic monitoring has become an important tool for harmonic management in distribution systems. A comprehensive harmonic monitoring program has been designed and implemented on ...
Ali Asheibi, David Stirling, Danny Soetanto
METRICS
2002
IEEE
14 years 12 days ago
Gemini: Maintenance Support Environment Based on Code Clone Analysis
Maintaining software systems is getting more complex and difficult task, as the scale becomes larger. It is generally said that code clone is one of the factors that make softwar...
Yasushi Ueda, Toshihiro Kamiya, Shinji Kusumoto, K...
ISCIS
2009
Springer
14 years 2 months ago
A web-based data source for metabolomics
—With the development of improved and cost-effective technologies, it is now possible to detect thousands of metabolites in biofluids or specific organs, and reliably quantify th...
Ali Cakmak, Arun Dsouza, Richard Hanson, Gultekin ...
ICRA
2009
IEEE
148views Robotics» more  ICRA 2009»
14 years 2 months ago
Graph-based robust shape matching for robotic application
— Shape is one of the useful information for object detection. The human visual system can often recognize objects based on the 2-D outline shape alone. In this paper, we address...
Hanbyul Joo, Yekeun Jeong, Olivier Duchenne, Seong...