Sciweavers

2032 search results - page 390 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
112
Voted
IMC
2006
ACM
15 years 7 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...
VLSID
2001
IEEE
164views VLSI» more  VLSID 2001»
16 years 2 months ago
An Efficient Parallel Transparent Bist Method For Multiple Embedded Memory Buffers
In this paper, we propose a new transparent built-in self-test ( TBIST ) method to test multiple embedded memory arrays with various sizes in parallel. First, a new transparent tes...
Der-Cheng Huang, Wen-Ben Jone, Sunil R. Das
BMCBI
2007
152views more  BMCBI 2007»
15 years 2 months ago
Bioinformatic identification of novel putative photoreceptor specific cis-elements
Background: Cell specific gene expression is largely regulated by different combinations of transcription factors that bind cis-elements in the upstream promoter sequence. However...
Charles G. Danko, Vera A. McIlvain, Maochun Qin, B...
TCSV
2008
177views more  TCSV 2008»
15 years 1 months ago
An ICA Mixture Hidden Markov Model for Video Content Analysis
In this paper, a new theoretical framework based on hidden Markov model (HMM) and independent component analysis (ICA) mixture model is presented for content analysis of video, nam...
Jian Zhou, Xiao-Ping Zhang
CVPR
2007
IEEE
16 years 3 months ago
Multi-Layer Background Subtraction Based on Color and Texture
In this paper, we propose a robust multi-layer background subtraction technique which takes advantages of local texture features represented by local binary patterns (LBP) and pho...
Jian Yao, Jean-Marc Odobez