• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,603
Next 10 →

A database and evaluation methodology for optical flow

by Simon Baker, Daniel Scharstein, J. P. Lewis, Stefan Roth, Michael J. Black, Richard Szeliski - In Proceedings of the IEEE International Conference on Computer Vision , 2007
"... The quantitative evaluation of optical flow algorithms by Barron et al. (1994) led to significant advances in performance. The challenges for optical flow algorithms today go beyond the datasets and evaluation methods proposed in that paper. Instead, they center on problems associated with complex n ..."
Abstract - Cited by 407 (22 self) - Add to MetaCart
natural scenes, including nonrigid motion, real sensor noise, and motion discontinuities. We propose a new set of benchmarks and evaluation methods for the next generation of optical flow algorithms. To that end, we contribute four types of data to test different aspects of optical flow algorithms: (1

ROAMing Terrain: Real-time Optimally Adapting Meshes

by Mark Duchaineau , Murray Wolinsky, David E. Sigeti, Mark C. Miller , Charles Aldrich, Mark B. Mineev-Weinstein , 1997
"... Terrain visualization is a difficult problem for applications requiring accurate images of large datasets at high frame rates, such as flight simulation and ground-based aircraft testing using synthetic sensor stimulation. On current graphics hardware, the problem is to maintain dynamic, view-depend ..."
Abstract - Cited by 287 (10 self) - Add to MetaCart
Terrain visualization is a difficult problem for applications requiring accurate images of large datasets at high frame rates, such as flight simulation and ground-based aircraft testing using synthetic sensor stimulation. On current graphics hardware, the problem is to maintain dynamic, view

High performance imaging using large camera arrays.

by Bennett Wilburn , Neel Joshi , Vaibhav Vaish , Eino-Ville Talvala , Emilio Antunez , Adam Barth , Andrew Adams , Mark Horowitz , Marc Levoy - ACM ToG , 2005
"... Abstract The advent of inexpensive digital image sensors and the ability to create photographs that combine information from a number of sensed images are changing the way we think about photography. In this paper, we describe a unique array of 100 custom video cameras that we have built, and we su ..."
Abstract - Cited by 199 (7 self) - Add to MetaCart
Abstract The advent of inexpensive digital image sensors and the ability to create photographs that combine information from a number of sensed images are changing the way we think about photography. In this paper, we describe a unique array of 100 custom video cameras that we have built, and we

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation

by Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee , 2007
"... We present a new kind of network perimeter monitoring strategy, which focuses on recognizing the infection and coordination dialog that occurs during a successful malware infection. BotHunter is an application designed to track the two-way communication flows between internal assets and external ent ..."
Abstract - Cited by 197 (18 self) - Add to MetaCart
entities, developing an evidence trail of data exchanges that match a state-based infection sequence model. BotHunter consists of a correlation engine that is driven by three malware-focused network packet sensors, each charged with detecting specific stages of the malware infection process, including

A Self-Localization Method for Wireless Sensor Networks

by Randolph L. Moses, Dushyanth Krishnamurthy, Robert Patterson - EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING , 2002
"... We consider the problem of locating and orienting a network of unattended sensor nodes that have been deployed in a scene at unknown locations and orientation angles. This self-calibration problem is solved by placing a number of source signals, also with unknown locations, in the scene. Each sou ..."
Abstract - Cited by 118 (5 self) - Add to MetaCart
We consider the problem of locating and orienting a network of unattended sensor nodes that have been deployed in a scene at unknown locations and orientation angles. This self-calibration problem is solved by placing a number of source signals, also with unknown locations, in the scene. Each

Tributaries and deltas: Efficient and robust aggregation in sensor network streams

by Amit Manjhi - In SIGMOD , 2005
"... Existing energy-efficient approaches to in-network aggregation in sensor networks can be classified into two categories, tree-based and multi-path-based, with each having unique strengths and weaknesses. In this paper, we introduce Tributary-Delta, a novel approach that combines the advantages of th ..."
Abstract - Cited by 115 (2 self) - Add to MetaCart
Existing energy-efficient approaches to in-network aggregation in sensor networks can be classified into two categories, tree-based and multi-path-based, with each having unique strengths and weaknesses. In this paper, we introduce Tributary-Delta, a novel approach that combines the advantages

Sympathetic interfaces: Using a plush toy to direct synthetic characters

by Michael Patrick Johnson, Andrew Wilson, Bruce Blumberg, Christopher Kline, Aaron Bobick , 1999
"... We introduce the concept of a sympathetic inter$ace for controlling an animated synthetic character in a 3D virtual environment. A plush doll embedded with wireless sensors is used to manipulate the virtual character in an iconic and intentional manner. The interface extends from the novel physical ..."
Abstract - Cited by 96 (18 self) - Add to MetaCart
We introduce the concept of a sympathetic inter$ace for controlling an animated synthetic character in a 3D virtual environment. A plush doll embedded with wireless sensors is used to manipulate the virtual character in an iconic and intentional manner. The interface extends from the novel physical

Synthetic Biomimetic Membranes and Their Sensor Applications

by Young-rok Kim, Sungho Jung, Hyunil Ryu, Yeong-eun Yoo, Sun Min Kim, Tae-joon Jeon , 2012
"... sensors ..."
Abstract - Add to MetaCart
sensors

ATM activation by DNA double-strand breaks through

by Ji-hoon Lee, Tanya T. Paull - the Mre11-Rad50-Nbs1 complex. Science. 2005; 308:551–4. [PubMed: 15790808
"... The ataxia-telangiectasia mutated (ATM) kinase signals the presence of DNA double-strand breaks in mammalian cells by phosphorylating proteins that initiate cell-cycle arrest, apoptosis, and DNA repair. We show that the Mre11-Rad50-Nbs1 (MRN) complex acts as a double-strand break sensor for ATM and ..."
Abstract - Cited by 136 (0 self) - Add to MetaCart
The ataxia-telangiectasia mutated (ATM) kinase signals the presence of DNA double-strand breaks in mammalian cells by phosphorylating proteins that initiate cell-cycle arrest, apoptosis, and DNA repair. We show that the Mre11-Rad50-Nbs1 (MRN) complex acts as a double-strand break sensor for ATM

Automated design of synthetic ribosome binding sites to control protein expression

by Howard M. Salis, Ethan A. Mirsky, Christopher A. Voigt - Nat Biotechnol , 2009
"... Microbial engineering often requires fine control over protein expression; for example, to connect genetic circuits 1-7 or control flux through a metabolic pathway 8-13. We have developed a predictive design method for synthetic ribosome binding sites that enables the rational control of a protein&a ..."
Abstract - Cited by 87 (4 self) - Add to MetaCart
contexts can result in different protein expression levels. We demonstrate the method's utility by rationally optimizing a protein's expression level to connect a genetic sensor to a synthetic circuit. The proposed forward engineering approach will accelerate the construction and systematic
Next 10 →
Results 1 - 10 of 3,603
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University