Sciweavers

IV
2009
IEEE
131views Visualization» more  IV 2009»
14 years 6 months ago
A Visualization and Level-of-Detail Control Technique for Large Scale Time Series Data
We have various interesting time series data in our daily life, such as weather data (e.g., temperature and air pressure) and stock prices. Polyline chart is one of the most commo...
Yumiko Uchida, Takayuki Itoh
IV
2009
IEEE
141views Visualization» more  IV 2009»
14 years 6 months ago
VioNeS - Visual Support for the Analysis of the Next Sub-volume Method
Computational simulation is an established method to gain insight into cellular processes. As the resulting data sets are usually large and complex, visualization can play a signi...
Andrea Unger, Enrico Gutzeit, Matthias Jeschke, He...
IV
2009
IEEE
100views Visualization» more  IV 2009»
14 years 6 months ago
Scouting Requirements Quality Using Visual Representations
Examining the quality of a set of requirements is a sensible project health check given their role in the engineering of quality software systems. However, not all project stakeho...
Orlena Gotel, Francis T. Marchese
IFITA
2009
IEEE
14 years 6 months ago
The Effect of Open Market Repurchase on Company's Value
This paper investigates on nine listed Companies in Shanghai and Shenzhen stock markets that have implemented the Open Market Repurchase (OMR) program. In this research, the event ...
Fengju Xu, Feng Wang
IEEEIAS
2009
IEEE
14 years 6 months ago
Network Security Situation Awareness Using Exponential and Logarithmic Analysis
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
Xiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping
IEEEIAS
2009
IEEE
14 years 6 months ago
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation
: This paper proposes a new watermarking method for detecting image tampering. First, an authentication number is created using a pair of watermark pixels as the coefficients of a ...
Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng...
IEEEIAS
2009
IEEE
14 years 6 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
IEEEIAS
2009
IEEE
14 years 6 months ago
Guess and Determine Attack on SOSEMANUK
SOSEMANUK is a word-oriented stream cipher submitted to the ECRYPT stream cipher project, with a variable-length key between 128 and 256 bits. The algorithm is similar to the strea...
Ding Lin, Guan Jie
IEEEIAS
2009
IEEE
14 years 6 months ago
Octagonal Search Algorithm with Early Termination for Fast Motion Estimation on H.264
: An adaptive threshold for early termination is proposed in this paper to enhance the cross octagonal search algorithm (COSA)[1]. In block motion estimation, search patterns have ...
Zhaopeng Cui, Dujuan Wang, Guang Jiang, Chengke Wu
IEEEIAS
2009
IEEE
14 years 6 months ago
Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale Voting
—There have been several studies on using computer technologies to improve elections and these studies lead to widespread adoption of “direct recording electronic” (DRE) voti...
Chung-Huang Yang, Shih-Yi Tu, Pei-Hua Yen