Sciweavers

145 search results - page 29 / 29
» Graph Drawing for Security Visualization
Sort
View
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 3 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
URBAN
2011
185views more  URBAN 2011»
13 years 8 days ago
Supporting geographically-aware web document foraging and sensemaking
This paper reports on the development and application of strategies and tools for geographic information seeking and knowledge building that leverages unstructured text resources ...
Brian M. Tomaszewski, Justine Blanford, Kevin Ross...
ICWL
2004
Springer
13 years 10 months ago
Learning Algorithms with an Electronic Chalkboard over the Web
This paper describes a system for the animation of algorithms on an electronic chalkboard. The instructor teaching an algorithm can enter data directly through a drawing- the algor...
Margarita Esponda Argüero, Raúl Rojas
SOFTVIS
2003
ACM
13 years 10 months ago
Nice Class Diagrams Admit Good Design?
Analysis and design of programs by using tools has emerged to a standard technique in object-oriented software engineering. Many of these tools claim to implement methods accordin...
Holger Eichelberger
IVS
2006
127views more  IVS 2006»
13 years 5 months ago
Feature hiding in 3D human body scans
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Joseph Laws, Nathaniel Bauernfeind, Yang Cai 0002