Sciweavers

6104 search results - page 1129 / 1221
» Constructing Information Bases Using Associative Structures
Sort
View
NSPW
2004
ACM
15 years 8 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
164
Voted
VISUALIZATION
1999
IEEE
15 years 7 months ago
Hue-Balls and Lit-Tensors for Direct Volume Rendering of Diffusion Tensor Fields
With the development of magnetic resonance imaging techniques for acquiring diffusion tensor data from biological tissue, visualization of tensor data has become a new research fo...
Gordon L. Kindlmann, David M. Weinstein
MM
1998
ACM
79views Multimedia» more  MM 1998»
15 years 7 months ago
Organizing Multicast Receivers Deterministically by Packet-Loss Correlation
The ability to trace multicast paths is currently available in the Internet by means of IGMP MTRACE packets. We introduce Tracer, the rst protocol that organizes the receivers of ...
Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-...
CSCLP
2006
Springer
15 years 7 months ago
Efficient Recognition of Acyclic Clustered Constraint Satisfaction Problems
Abstract. In this paper we present a novel approach to solving Constraint Satisfaction Problems whose constraint graphs are highly clustered and the graph of clusters is close to b...
Igor Razgon, Barry O'Sullivan
ADBIS
2000
Springer
117views Database» more  ADBIS 2000»
15 years 7 months ago
Multiversion Linear Quadtree for Spatio-Temporal Data
Research in spatio-temporal databases has largely focused on extensions of access methods for the proper handling of time changing spatial information. In this paper, we present th...
Theodoros Tzouramanis, Michael Vassilakopoulos, Ya...
« Prev « First page 1129 / 1221 Last » Next »