Sciweavers

160 search results - page 29 / 32
» Analyzing the Terrorist Social Networks with Visualization T...
Sort
View
VL
2009
IEEE
131views Visual Languages» more  VL 2009»
15 years 5 months ago
Attitudes and self-efficacy in young adults' computing autobiographies
Little is known about the formation of people’s first perceptions about computers and computer code, yet it is likely that these impressions have a lasting effect on peoples’ ...
Andrew J. Ko
ICDM
2006
IEEE
148views Data Mining» more  ICDM 2006»
15 years 4 months ago
Data Mining Approaches to Criminal Career Analysis
— Narrative reports and criminal records are stored digitally across individual police departments, enabling the collection of this data to compile a nation-wide database of crim...
Jeroen S. de Bruin, Tim K. Cocx, Walter A. Kosters...
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
15 years 5 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
CD
2004
Springer
15 years 2 months ago
A Tailorable Environment for Assessing the Quality of Deployment Architectures in Highly Distributed Settings
Abstract. A distributed software system's deployment architecture can have a significant impact on the system's properties. These properties will depend on various system...
Marija Mikic-Rakic, Sam Malek, Nels Beckman, Nenad...
IUI
2005
ACM
15 years 3 months ago
Interfaces for networked media exploration and collaborative annotation
In this paper, we present our efforts towards creating interfaces for networked media exploration and collaborative annotation. The problem is important since online social networ...
Preetha Appan, Bageshree Shevade, Hari Sundaram, D...