Sciweavers

417 search results - page 59 / 84
» Synthesizing Test Data for Fraud Detection Systems
Sort
View
ATAL
2009
Springer
14 years 2 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
SAC
2009
ACM
14 years 16 days ago
SWOBE - embedding the semantic web languages RDF, SPARQL and SPARUL into java for guaranteeing type safety, for checking the sat
The Semantic Web and its technologies become increasingly important. As more and more Semantic Web applications are being used, developing more stable Semantic Web applications be...
Sven Groppe, Jana Neumann, Volker Linnemann
ICDAR
2009
IEEE
13 years 5 months ago
ICDAR 2009 Signature Verification Competition
Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is perfor...
Vivian L. Blankers, C. Elisa van den Heuvel, Katri...
IJCV
2002
108views more  IJCV 2002»
13 years 7 months ago
Epipolar Geometry for Central Catadioptric Cameras
Abstract. In this paper we present an automatic hybrid matching system mixing images coming from central catadioptric systems and conventional cameras. We analyze three models of h...
Tomás Svoboda, Tomás Pajdla
GCB
2009
Springer
154views Biometrics» more  GCB 2009»
13 years 11 months ago
Comparative Identification of Differential Interactions from Trajectories of Dynamic Biological Networks
Abstract: It is often challenging to reconstruct accurately a complete dynamic biological network due to the scarcity of data collected in cost-effective experiments. This paper ad...
Zhengyu Ouyang, Mingzhou Song