Sciweavers

649 search results - page 117 / 130
» Visualization in string theory
Sort
View
VIROLOGY
2010
162views more  VIROLOGY 2010»
14 years 8 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
DPHOTO
2009
154views Hardware» more  DPHOTO 2009»
14 years 7 months ago
Optimal color filter array design: quantitative conditions and an efficient search procedure
Most digital cameras employ a spatial subsampling process, implemented as a color filter array (CFA), to capture color images. The choice of CFA patterns has a great impact on the...
Yue M. Lu, Martin Vetterli
ICONIP
2010
14 years 7 months ago
Facial Expression Based Automatic Album Creation
With simple cost effective imaging solutions being widely available these days, there has been an enormous rise in the number of images consumers have been taking. Due to this incr...
Abhinav Dhall, Akshay Asthana, Roland Goecke
84
Voted
IJACTAICIT
2010
155views more  IJACTAICIT 2010»
14 years 7 months ago
Constructive Dynamic Program Slicing Research
Program slicing is a promising technique for providing automated support for various important software engineering activities. There exists hundreds of scientific studies on the ...
Jaakko Korpi, Jussi Koskinen
PRESENCE
2010
181views more  PRESENCE 2010»
14 years 4 months ago
The Effect of Viewing a Self-Avatar on Distance Judgments in an HMD-Based Virtual Environment
Few HMD-based virtual environment systems display a rendering of the user's own body. Subjectively, this often leads to a sense of disembodiment in the virtual world. We expl...
Betty J. Mohler, Sarah H. Creem-Regehr, William B....