Sciweavers

7544 search results - page 1337 / 1509
» Network Forensics Analysis
Sort
View
149
Voted
VL
2008
IEEE
133views Visual Languages» more  VL 2008»
15 years 11 months ago
Analyzing a socio-technical visualization tool using usability inspection methods
Ariadne is a novel visualization tool that allows end users to explore the socio-technical relationships in software development projects. Essentially the visualization is a varia...
Erik Trainer, Stephen Quirk, Cleidson R. B. de Sou...
145
Voted
3DIM
2007
IEEE
15 years 11 months ago
Generalized MPU Implicits Using Belief Propagation
In this paper, we present a new algorithm to reconstruct 3D surfaces from an unorganized point cloud based on generalizing the MPU implicit algorithm through introducing a powerfu...
Yi-Ling Chen, Shang-Hong Lai, Tung-Ying Lee
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
15 years 11 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
CSMR
2007
IEEE
15 years 11 months ago
Consistently Incorporating Changes to Evolve Transition-based Systems
Evolving software-intensive systems from one consistent state to another is a challenging activity due to the intricate inter-dependencies among the components. In this paper, we ...
Mahadevan Subramaniam, Harvey P. Siy
GLOBECOM
2007
IEEE
15 years 11 months ago
A New Design of Bloom Filter for Packet Inspection Speedup
— Bloom filter is a space-efficient randomized data structure for group membership query. It is widely used in networking applications which involve the packet header/content i...
Yang Chen, Abhishek Kumar, Jun Xu
« Prev « First page 1337 / 1509 Last » Next »