Sciweavers

102 search results - page 18 / 21
» Low-Transition Test Pattern Generation for BIST-Based Applic...
Sort
View
PR
2006
99views more  PR 2006»
13 years 7 months ago
Authenticating corrupted photo images based on noise parameter estimation
Photo image authentication is an interesting and demanding field in the computer vision and image processing community. This research is motivated by its wide range of application...
Sang-Woong Lee, Ho-Choul Jung, Bon-Woo Hwang, Seon...
GCB
2005
Springer
98views Biometrics» more  GCB 2005»
14 years 29 days ago
Composite Module Analyst: A Fitness-Based Tool for Prediction of Transcription Regulation
: Functionally related genes involved in the same molecular-genetic, biochemical, or physiological process are often regulated coordinately Such regulation is provided by precisely...
Alexander E. Kel, Tatiana Konovalova, Tagir Valeev...
ISMIS
2005
Springer
14 years 29 days ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
VISUALIZATION
2002
IEEE
14 years 11 days ago
Tensor Field Visualisation using Adaptive Filtering of Noise Fields combined with Glyph Rendering
While many methods exist for visualising scalar and vector data, visualisation of tensor data is still troublesome. We present a method for visualising second order tensors in thr...
Andreas Sigfridsson, Tino Ebbers, Einar Heiberg, L...
TABLETOP
2008
IEEE
14 years 1 months ago
Pokey: Interaction through covert structured light
In this paper we describe a method to support interaction with a cellphone based projectorcamera system. We describe a novel approach that uses a technique known in Computer Visio...
Christopher Richard Wren, Yuri A. Ivanov, Paul A. ...