Sciweavers

5085 search results - page 931 / 1017
» Multidimensional Design by Examples
Sort
View
83
Voted
WS
2006
ACM
15 years 4 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
86
Voted
C5
2005
IEEE
15 years 3 months ago
Filters and Tasks in Croquet
Croquet [11,12] is a collaborative 3D platform that allows users to work together to create and share ideas. From the beginning we have worked to ensure that the Croquet interface...
David A. Smith, Andreas Raab, Yoshiki Ohshima, Dav...
91
Voted
CSB
2005
IEEE
152views Bioinformatics» more  CSB 2005»
15 years 3 months ago
Consensus Genetic Maps: A Graph Theoretic Approach
A genetic map is an ordering of genetic markers constructed from genetic linkage data for use in linkage studies and experimental design. While traditional methods have focused on...
Benjamin G. Jackson, Srinivas Aluru, Patrick S. Sc...
76
Voted
INFOVIS
2005
IEEE
15 years 3 months ago
Parallel Sets: Visual Analysis of Categorical Data
The discrete nature of categorical data makes it a particular challenge for visualization. Methods that work very well for continuous data are often hardly usable with categorical...
Fabian Bendix, Robert Kosara, Helwig Hauser
78
Voted
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
15 years 3 months ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold