Sciweavers

2032 search results - page 390 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
IMC
2006
ACM
15 years 3 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...
VLSID
2001
IEEE
164views VLSI» more  VLSID 2001»
15 years 10 months ago
An Efficient Parallel Transparent Bist Method For Multiple Embedded Memory Buffers
In this paper, we propose a new transparent built-in self-test ( TBIST ) method to test multiple embedded memory arrays with various sizes in parallel. First, a new transparent tes...
Der-Cheng Huang, Wen-Ben Jone, Sunil R. Das
BMCBI
2007
152views more  BMCBI 2007»
14 years 9 months ago
Bioinformatic identification of novel putative photoreceptor specific cis-elements
Background: Cell specific gene expression is largely regulated by different combinations of transcription factors that bind cis-elements in the upstream promoter sequence. However...
Charles G. Danko, Vera A. McIlvain, Maochun Qin, B...
97
Voted
TCSV
2008
177views more  TCSV 2008»
14 years 9 months ago
An ICA Mixture Hidden Markov Model for Video Content Analysis
In this paper, a new theoretical framework based on hidden Markov model (HMM) and independent component analysis (ICA) mixture model is presented for content analysis of video, nam...
Jian Zhou, Xiao-Ping Zhang
CVPR
2007
IEEE
15 years 11 months ago
Multi-Layer Background Subtraction Based on Color and Texture
In this paper, we propose a robust multi-layer background subtraction technique which takes advantages of local texture features represented by local binary patterns (LBP) and pho...
Jian Yao, Jean-Marc Odobez