Sciweavers

2746 search results - page 547 / 550
» Case Study in Survivable Network System Analysis
Sort
View
97
Voted
VIZSEC
2005
Springer
15 years 3 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
LCTRTS
2004
Springer
15 years 2 months ago
Feedback driven instruction-set extension
Application specific instruction-set processors combine an efficient general purpose core with special purpose functionality that is tailored to a particular application domain. ...
Uwe Kastens, Dinh Khoi Le, Adrian Slowik, Michael ...
CORR
2006
Springer
112views Education» more  CORR 2006»
14 years 9 months ago
Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to Items
Broadcasting is known to be an efficient means of disseminating data in wireless communication environments (such as Satellite, mobile phone networks,...). It has been recently ob...
Julien Robert, Nicolas Schabanel
BMCBI
2004
123views more  BMCBI 2004»
14 years 9 months ago
Interaction profile-based protein classification of death domain
Background: The increasing number of protein sequences and 3D structure obtained from genomic initiatives is leading many of us to focus on proteomics, and to dedicate our experim...
Drew Lett, Michael Hsing, Frederic Pio
JCAL
2011
89views more  JCAL 2011»
14 years 12 days ago
What if undergraduate students designed their own web learning environment? Exploring students' web 2.0 mentality through partic
Following the increasing calls for a more skeptical analysis of web 2.0 and the empowerment of learners’ voices in formulating upcoming technologies, this paper elaborates on the...
George Palaigeorgiou, George Triantafyllakos, Avgo...