Sciweavers

783 search results - page 60 / 157
» Visual analysis of network centralities
Sort
View
CCGRID
2009
IEEE
15 years 4 months ago
Towards Visualization Scalability through Time Intervals and Hierarchical Organization of Monitoring Data
Highly distributed systems such as Grids are used today to the execution of large-scale parallel applications. The behavior analysis of these applications is not trivial. The comp...
Lucas Mello Schnorr, Guillaume Huard, Philippe Oli...
CHI
2007
ACM
15 years 1 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
CCS
2006
ACM
15 years 1 months ago
Attack graph generation and analysis
In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representati...
Jeannette M. Wing
WIOPT
2006
IEEE
15 years 3 months ago
Ad Hoc networks with topology-transparent scheduling schemes: Scaling laws and capacity/delay tradeoffs
— In this paper we investigate the limiting properties, in terms of capacity and delay, of an ad hoc network employing a topology-transparent scheduling scheme. In particular, we...
Daniele Miorandi, Hwee Pink Tan, Michele Zorzi
ICCNMC
2005
Springer
15 years 3 months ago
On Mitigating Network Partitioning in Peer-to-Peer Massively Multiplayer Games
Recently, peer-to-peer infrastructure has been proposed to support massively multiplayer games in the literature. However, when underlying network partitions due to network outages...
Yuan He, Yi Zhang, Jiang Guo