Sciweavers

216 search results - page 41 / 44
» Detecting Flaws and Intruders with Visual Data Analysis
Sort
View
133
Voted
CPM
2005
Springer
109views Combinatorics» more  CPM 2005»
15 years 5 months ago
Using PQ Trees for Comparative Genomics
Permutations on strings representing gene clusters on genomes have been studied earlier in [18, 14, 3, 12, 17] and the idea of a maximal permutation pattern was introduced in [12]....
Gad M. Landau, Laxmi Parida, Oren Weimann
96
Voted
ICIP
2010
IEEE
14 years 9 months ago
Acquiring shaking-free route panorama by stationary blurring
This work obtains shaking-free route panoramas from a vehicle borne camera. We detect the shaking and waving profile of the camera and rectify a long route panorama automatically ...
Hongyuan Cai, Jiang Yu Zheng, Hiromi T. Tanaka
WWW
2011
ACM
14 years 6 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...
130
Voted
EWSN
2009
Springer
15 years 6 months ago
SCOPES: Smart Cameras Object Position Estimation System
In this paper we present SCOPES, a distributed Smart Camera Object Position Estimation sensor network System that provides maps of distribution of people in indoors environments. ...
Ankur Kamthe, Lun Jiang, Matthew Dudys, Alberto Ce...
128
Voted
WCRE
1999
IEEE
15 years 3 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...