Sciweavers

77 search results - page 10 / 16
» A User Authentication System Using Schema of Visual Memory
Sort
View
IV
2008
IEEE
100views Visualization» more  IV 2008»
14 years 1 months ago
An Interactive Map of Semantic Web Ontology Usage
Publishing information on the Semantic Web using common formats enables data to be linked together, integrated and reused. In order to fully leverage the potential for interlinkin...
Sheila Kinsella, Uldis Bojars, Andreas Harth, John...
SOUPS
2006
ACM
14 years 1 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
IUI
2000
ACM
13 years 11 months ago
Data exploration across temporal contexts
The ability to quickly explore and compare multiple scenarios is an important component of exploratory data analysis. Yet today’s interfaces cannot represent alternative explora...
Mark Derthick, Steven F. Roth
VVS
1995
IEEE
157views Visualization» more  VVS 1995»
13 years 11 months ago
Cube-3: A Real-Time Architecture for High-Resolution Volume Visualization
This paper describes a high-performance special-purpose system, Cube-3, for displaying and manipulating highresolution volumetric datasets in real-time. A primary goal of Cube-3 i...
Hanspeter Pfister, Arie E. Kaufman, Tzi-cker Chiue...
GD
2008
Springer
13 years 8 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...