Sciweavers

376 search results - page 36 / 76
» Visual Detection of Design Anomalies
Sort
View
ECOI
2010
144views more  ECOI 2010»
15 years 1 months ago
Machine reasoning about anomalous sensor data
We describe a semantic data validation tool that is capable of observing incoming real-time sensor data and performing reasoning against a set of rules specific to the scientific d...
Matt Calder, Robert A. Morris, Francesco Peri
NIPS
1990
15 years 4 months ago
A Delay-Line Based Motion Detection Chip
Inspired by a visual motion detection model for the rabbit retina and by a computational architecture used for early audition in the barn owl, we have designed a chip that employs...
Timothy K. Horiuchi, John Lazzaro, Andrew Moore, C...
140
Voted
VIZSEC
2005
Springer
15 years 8 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
INFOCOM
2012
IEEE
13 years 5 months ago
Origin-destination flow measurement in high-speed networks
—An origin-destination (OD) flow between two routers is the set of packets that pass both routers in a network. Measuring the sizes of OD flows is important to many network man...
Tao Li, Shigang Chen, Yan Qiao
134
Voted
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
16 years 3 months ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen