Sciweavers

415 search results - page 34 / 83
» Intruders pattern identification
Sort
View
123
Voted
ICIP
2005
IEEE
16 years 5 months ago
Eigenwalks: walk detection and biometrics from symmetry patterns
In this paper we present a symmetry-based approach which can be used to detect humans and to extract biometric characteristics from video image-sequences. The method employs a simp...
Laszlo Havasi, Tamás Szirányi, Zolt&...
133
Voted
ICSOC
2007
Springer
15 years 10 months ago
Architectural Decisions and Patterns for Transactional Workflows in SOA
Abstract. An important architectural style for constructing enterprise applications is to use transactional workflows in SOA. In this setting, workflow activities invoke distribute...
Olaf Zimmermann, Jonas Grundler, Stefan Tai, Frank...
163
Voted
IAT
2006
IEEE
15 years 9 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
149
Voted
IWPC
1998
IEEE
15 years 8 months ago
Pattern Visualization for Software Comprehension
Cognitive science emphasizes the strength of visual formalisms for human learning and problem solving. In software engineering, a clear, visual presentation of a system's arc...
Reinhard Schauer, Rudolf K. Keller
118
Voted
EVOW
2006
Springer
15 years 7 months ago
Functional Classification of G-Protein Coupled Receptors, Based on Their Specific Ligand Coupling Patterns
Functional identification of G-Protein Coupled Receptors (GPCRs) is one of the current focus areas of pharmaceutical research. Although thousands of GPCR sequences are known, many ...
Burcu Bakir, Osman Ugur Sezerman