Sciweavers

1356 search results - page 55 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
SADM
2011
14 years 6 months ago
Trellis display for modeling data from designed experiments
Abstract: Visualizing data by graphing a response against certain factors, and conditioning on other factors, has arisen independently in many contexts. One is the interaction plot...
Montserrat Fuentes, Bowei Xi, William S. Cleveland
ACCV
2007
Springer
15 years 6 months ago
Human Pose Estimation from Volume Data and Topological Graph Database
This paper proposes a novel volume-based motion capture method using a bottom-up analysis of volume data and an example topology database of the human body. By using a two-step gra...
Hidenori Tanaka, Atsushi Nakazawa, Haruo Takemura
CVPR
2010
IEEE
14 years 10 months ago
Rapid and accurate developmental stage recognition of C. elegans from high-throughput image data
We present a hierarchical principle for object recognition and its application to automatically classify developmental stages of C. elegans animals from a population of mixed stag...
Amelia White, Huey-Ling Kao, Patricia Cipriani, Br...
ESORICS
2008
Springer
15 years 1 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
CIKM
1997
Springer
15 years 4 months ago
Learning Belief Networks from Data: An Information Theory Based Approach
This paper presents an efficient algorithm for learning Bayesian belief networks from databases. The algorithm takes a database as input and constructs the belief network structur...
Jie Cheng, David A. Bell, Weiru Liu