Sciweavers

2990 search results - page 181 / 598
» Thresholding for Change Detection
Sort
View
IVS
2008
79views more  IVS 2008»
13 years 10 months ago
Scalable and interactive visual analysis of financial wire transactions for fraud detection
Large financial institutions such as Bank of America handle hundreds of thousands of wire transactions per day. Although most transactions are legitimate, these institutions have ...
Remco Chang, Alvin Lee, Mohammad Ghoniem, Robert K...
JSAC
2006
165views more  JSAC 2006»
13 years 10 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
PAMI
2007
187views more  PAMI 2007»
13 years 9 months ago
Detecting Motion Regions in the Presence of a Strong Parallax from a Moving Camera by Multiview Geometric Constraints
—We present a method for detecting motion regions in video sequences observed by a moving camera in the presence of a strong parallax due to static 3D structures. The proposed me...
Chang Yuan, Gérard G. Medioni, Jinman Kang,...
FIW
2009
101views Communications» more  FIW 2009»
13 years 8 months ago
Feature Interaction Detection in the Feature Language Extensions
One of the most difficult tasks in software development is that features are implemented by changing the code of other features. This problem cannot be solved with existing general...
Lei Sun, Lu Zhoa, Yimeng Li, Wu-Hon F. Leung
ISSS
1996
IEEE
87views Hardware» more  ISSS 1996»
14 years 2 months ago
Breakpoints and Breakpoint Detection in Source Level Emulation
In this paper we discuss, what breakpoints in Source Level Emulationa are, how we can work with them and how we have to change the cicuit generated by high level synthesis to do s...
Gernot Koch, Udo Kebschull, Wolfgang Rosenstiel