Sciweavers

783 search results - page 64 / 157
» Visual analysis of network centralities
Sort
View
IJON
2002
120views more  IJON 2002»
13 years 11 months ago
The recognition and analysis of animate objects using neural networks and active contour models
: In this paper we describe a method for tracking walking humans in the visual field. Active contour models are used to track moving objects in a sequence of images. The resulting ...
Ken Tabb, Neil Davey, Rod Adams, Stella J. George
FLAIRS
2006
14 years 18 days ago
Design, Implementation and Performance Analysis of Pervasive Surveillance Networks
Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system are expresse...
Amit Goradia, Zhiwei Cen, Clayton Haffner, Ning Xi...
STOC
2007
ACM
127views Algorithms» more  STOC 2007»
14 years 11 months ago
First to market is not everything: an analysis of preferential attachment with fitness
The design of algorithms on complex networks, such as routing, ranking or recommendation algorithms, requires a detailed understanding of the growth characteristics of the network...
Christian Borgs, Jennifer T. Chayes, Constantinos ...
ICIP
2004
IEEE
15 years 24 days ago
Distributed compression of the plenoptic function
In this paper, we consider the problem of distributed compression in camera sensor networks. Due to the spatial proximity of the different cameras, acquired images can be highly d...
Nicolas Gehrig, Pier Luigi Dragotti
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 9 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé