Sciweavers

1356 search results - page 23 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
DATE
2007
IEEE
89views Hardware» more  DATE 2007»
14 years 2 months ago
Mapping multi-dimensional signals into hierarchical memory organizations
The storage requirements of the array-dominated and looporganized algorithmic specifications running on embedded systems can be significant. Employing a data memory space much l...
Hongwei Zhu, Ilie I. Luican, Florin Balasa
SERA
2007
Springer
14 years 2 months ago
Comparative Analysis of Neural Network Techniques Vs Statistical Methods in Capacity Planning
Capacity planning is a technique which can be used to predict the computing resource needs of an organization for the future after studying current usage patterns. This is of spec...
Nalini Vasudevan, Gowri C. Parthasarathy
VISUALIZATION
2005
IEEE
14 years 1 months ago
Query-Driven Visualization of Large Data Sets
We present a practical and general-purpose approach to large and complex visual data analysis where visualization processing, rendering and subsequent human interpretation is cons...
Kurt Stockinger, John Shalf, Kesheng Wu, E. Wes Be...
ACSAC
2005
IEEE
14 years 1 months ago
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach
With the increasing security threats from infrastructure attacks such as worms and distributed denial of service attacks, it is clear that the cooperation among different organiza...
Dingbang Xu, Peng Ning
CHI
2011
ACM
12 years 11 months ago
Guess who?: enriching the social graph through a crowdsourcing game
Despite the tremendous popularity of social network sites both on the web and within enterprises, the relationship information they contain may be often incomplete or outdated. We...
Ido Guy, Adam Perer, Tal Daniel, Ohad Greenshpan, ...