Sciweavers

1052 search results - page 143 / 211
» SUIDT: safe user interface design tool
Sort
View
VIZSEC
2005
Springer
15 years 3 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
BMCBI
2006
145views more  BMCBI 2006»
14 years 10 months ago
Querying the public databases for sequences using complex keywords contained in the feature lines
Background: High throughput technologies often require the retrieval of large data sets of sequences. Retrieval of EMBL or GenBank entries using keywords is easy using tools such ...
Olivier Croce, Michaël Lamarre, Richard Chris...
ICMCS
2005
IEEE
134views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Hidden Markov Model Based Characterization of Content Access Patterns in an e-Learning Environment
: Personalized Education (PE) emphasizes the importance of individual differences in learning. To deliver personalized e-learning services and content, PE encompasses the abilities...
Apple W. P. Fok, H. S. Wong, Y. S. Chen
PLDI
2006
ACM
15 years 3 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
UIST
2006
ACM
15 years 3 months ago
Comparing and managing multiple versions of slide presentations
Despite the ubiquity of slide presentations, managing multiple presentations remains a challenge. Understanding how multiple versions of a presentation are related to one another,...
Steven M. Drucker, Georg Petschnigg, Maneesh Agraw...