Exploratory visualization environments allow users to build and browse coordinated multiview visualizations interactively. As the number of views and amount of coordination increa...
In order to support knowledge workers throughout their task of searching, locating and manipulating information, a system that provides information suitable for a particular userâ...
Source repositories are a promising database of information about software projects. This paper proposes a tool to extract and summarize information from CVS logs in order to ident...
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
In this paper, we describe System Detection’s surveillance detection techniques for enclave environments (ESD) and peering center environments (PSD) and evaluate each technique ...
Seth Robertson, Eric V. Siegel, Matthew Miller, Sa...