Sciweavers

961 search results - page 103 / 193
» Visual Cryptography on Graphs
Sort
View
107
Voted
UIST
2009
ACM
15 years 9 months ago
Relaxed selection techniques for querying time-series graphs
Time-series graphs are often used to visualize phenomena that change over time. Common tasks include comparing values at different points in time and searching for specified patte...
Christian Holz, Steven Feiner
103
Voted
ICPR
2010
IEEE
15 years 5 months ago
Cell Tracking in Video Microscopy Using Bipartite Graph Matching
Automated visual tracking of cells from video microscopy has many important biomedical applications. In this paper, we model the problem of cell tracking over pairs of video micro...
Ananda Chowdhury, Rohit Chatterjee, Mayukh Ghosh, ...
110
Voted
ATAL
2005
Springer
15 years 7 months ago
Discovering strategic multi-agent behavior in a robotic soccer domain
2. THE MASM ALGORITHM An input to the MASM algorithm is a time-annotated multi-agent action sequence. The action sequence is then transformed into an action graph. An action graph ...
Andraz Bezek
CHI
1996
ACM
15 years 6 months ago
Gratuitous Graphics? Putting Preferences in Perspective
Rapid growth in 3-D rendering technologies has deluged us with glitzy graphical representations. In what contexts do people find 3-D graphs of 2-D data both attractive and useful?...
Ellen Levy, Jeff Zacks, Barbara Tversky, Diane J. ...
143
Voted
ICDM
2010
IEEE
208views Data Mining» more  ICDM 2010»
15 years 11 days ago
Bonsai: Growing Interesting Small Trees
Graphs are increasingly used to model a variety of loosely structured data such as biological or social networks and entityrelationships. Given this profusion of large-scale graph ...
Stephan Seufert, Srikanta J. Bedathur, Juliá...