Sciweavers

140 search results - page 26 / 28
» Understanding the use of inheritance with visual patterns
Sort
View
TISSEC
2008
106views more  TISSEC 2008»
14 years 9 months ago
On predictive models and user-drawn graphical passwords
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
Paul C. van Oorschot, Julie Thorpe
VIROLOGY
2010
162views more  VIROLOGY 2010»
14 years 7 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
TITB
1998
135views more  TITB 1998»
14 years 9 months ago
ViVa: the virtual vascular project
The aim of the ViVa project is to develop tools for the modern hemodynamicist and cardiovascular surgeon to study and interpret the constantly increasing amount of information bei...
Gassan Abdoulaev, Sandro Cadeddu, Giovanni Delussu...
CHI
2004
ACM
15 years 9 months ago
Interactive Comprehensible Data Mining
This paper discusses a novel data mining system devised and developed at Birmingham, which attempts to provide a more effective data mining system. It ties in with the workshop go...
Andy Pryke, Russell Beale
EDM
2009
184views Data Mining» more  EDM 2009»
14 years 7 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...