Sciweavers

286 search results - page 37 / 58
» Lossless Regular Views
Sort
View
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
14 years 4 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
ICASSP
2009
IEEE
14 years 4 months ago
Sparse decomposition of mixed audio signals by basis pursuit with autoregressive models
We develop a framework to detect when certain sounds are present in a mixed audio signal. We focus on the regime where out of a large number of possible sounds, a small but unknow...
Youngmin Cho, Lawrence K. Saul
VL
2009
IEEE
150views Visual Languages» more  VL 2009»
14 years 4 months ago
Discovery-based edit assistance for spreadsheets
Spreadsheets can be viewed as a highly flexible endusers programming environment which enjoys wide-spread adoption. But spreadsheets lack many of the structured programming conce...
Jácome Cunha, João Saraiva, Joost Vi...
SCAM
2008
IEEE
14 years 4 months ago
From Indentation Shapes to Code Structures
In a previous study, we showed that indentation was regular across multiple languages and the variance in the level of indentation of a block of revised code is correlated with me...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
WACV
2008
IEEE
14 years 4 months ago
Mosaicfaces: a discrete representation for face recognition
Most face recognition algorithms use a “distancebased” approach: gallery and probe images are projected into a low dimensional feature space and decisions about matching are b...
Jania Aghajanian, Simon J. D. Prince