Sciweavers

1141 search results - page 137 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
CHI
2005
ACM
16 years 4 months ago
Visualization in law enforcement
Visualization techniques have proven to be critical in helping crime analysis. By interviewing and observing Criminal Intelligence Officers (CIO) and civilian crime analysts at th...
Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron...
DSN
2009
IEEE
15 years 11 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
DSN
2008
IEEE
15 years 11 months ago
AGIS: Towards automatic generation of infection signatures
An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that charac...
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael ...
HPDC
2008
IEEE
15 years 11 months ago
Key-based consistency and availability in structured overlay networks
Structured Overlay Networks provide a promising platform for high performance applications since they are scalable, fault-tolerant and self-managing. Structured overlays provide l...
Tallat M. Shafaat, Thorsten Schütt, Monika Mo...
IPPS
2007
IEEE
15 years 10 months ago
Linking Compilation and Visualization for Massively Parallel Programs
This paper presents a technique to visualize the communication pattern of a parallel application at different points during its execution. Unlike many existing tools that show the...
Alex K. Jones, Raymond R. Hoare, Joseph St. Onge, ...