Sciweavers

415 search results - page 39 / 83
» Intruders pattern identification
Sort
View
UIST
1998
ACM
15 years 2 months ago
A User Interface Using Fingerprint Recognition: Holding Commands and Data Objects on Fingers
This paper describes a new user interface, called a fingerprint user interface (FUI), which employs fingerprint recognition. While the unique feature patterns of fingerprints have...
Atsushi Sugiura, Yoshiyuki Koseki
CIKM
2005
Springer
15 years 3 months ago
Opportunity map: a visualization framework for fast identification of actionable knowledge
Data mining techniques frequently find a large number of patterns or rules, which make it very difficult for a human analyst to interpret the results and to find the truly interes...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Weimin Xia...
ASUNAM
2010
IEEE
14 years 11 months ago
COSI: Cloud Oriented Subgraph Identification in Massive Social Networks
Subgraph matching is a key operation on graph data. Social network (SN) providers may want to find all subgraphs within their social network that "match" certain query gr...
Matthias Bröcheler, Andrea Pugliese, V. S. Su...
IJCAI
1997
14 years 11 months ago
Object Identification in a Bayesian Context
Object identification—the task of deciding that two observed objects are in fact one and the same object—is a fundamental requirement for any situated agent that reasons about...
Timothy Huang, Stuart J. Russell
BMCBI
2010
202views more  BMCBI 2010»
14 years 10 months ago
NeMo: Network Module identification in Cytoscape
Background: As the size of the known human interactome grows, biologists increasingly rely on computational tools to identify patterns that represent protein complexes and pathway...
Corban G. Rivera, Rachit Vakil, Joel S. Bader