Sciweavers

376 search results - page 36 / 76
» Visual Detection of Design Anomalies
Sort
View
ECOI
2010
144views more  ECOI 2010»
13 years 6 months ago
Machine reasoning about anomalous sensor data
We describe a semantic data validation tool that is capable of observing incoming real-time sensor data and performing reasoning against a set of rules specific to the scientific d...
Matt Calder, Robert A. Morris, Francesco Peri
NIPS
1990
13 years 8 months ago
A Delay-Line Based Motion Detection Chip
Inspired by a visual motion detection model for the rabbit retina and by a computational architecture used for early audition in the barn owl, we have designed a chip that employs...
Timothy K. Horiuchi, John Lazzaro, Andrew Moore, C...
VIZSEC
2005
Springer
14 years 1 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
INFOCOM
2012
IEEE
11 years 10 months ago
Origin-destination flow measurement in high-speed networks
—An origin-destination (OD) flow between two routers is the set of packets that pass both routers in a network. Measuring the sizes of OD flows is important to many network man...
Tao Li, Shigang Chen, Yan Qiao
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
14 years 8 months ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen