Sciweavers

511 search results - page 17 / 103
» Organization Detection Using Emergent Computing
Sort
View
ISPEC
2007
Springer
14 years 1 months ago
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
Abstract. With the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital d...
Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
CVPR
2008
IEEE
14 years 9 months ago
Using contours to detect and localize junctions in natural images
Contours and junctions are important cues for perceptual organization and shape recognition. Detecting junctions locally has proved problematic because the image intensity surface...
Michael Maire, Pablo Arbelaez, Charless Fowlkes, J...
CEAS
2006
Springer
13 years 11 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...
ICPR
2010
IEEE
14 years 2 months ago
Multiple Plane Detection in Image Pairs Using J-Linkage
—We present a new method for the robust detection and matching of multiple planes in pairs of images. Such planes can serve as stable landmarks for vision-based urban navigation....
David Ford Fouhey, Daniel Scharstein, Amy Briggs
BMCBI
2008
128views more  BMCBI 2008»
13 years 8 months ago
Efficient computation of absent words in genomic sequences
Background: Analysis of sequence composition is a routine task in genome research. Organisms are characterized by their base composition, dinucleotide relative abundance, codon us...
Julia Herold, Stefan Kurtz, Robert Giegerich