Sciweavers

825 search results - page 102 / 165
» Bead: Explorations in Information Visualization
Sort
View
156
Voted
VIZSEC
2004
Springer
15 years 10 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
CACM
2000
130views more  CACM 2000»
15 years 4 months ago
Visual Generalization in Programming by Example
In Programming by Example [PBE, also sometimes called "Programming by Demonstration"] systems, the system records actions performed by a user in the interface, and produ...
Robert St. Amant, Henry Lieberman, Richard Potter,...
CLEF
2010
Springer
15 years 5 months ago
Improving Retrieval Using External Annotations: OHSU at ImageCLEF 2010
Over the past several years, our team has focused its efforts on improving retrieval precision performance by mixing visual and textual information. This year, we chose to explore ...
Steven Bedrick, Jayashree Kalpathy-Cramer
ICSM
1999
IEEE
15 years 9 months ago
Browsing and Searching Software Architectures
Software architecture visualization tools tend to support browsing, that is, exploration by following concepts. If architectural diagrams are to be used during daily software main...
Susan Elliott Sim, Charles L. A. Clarke, Richard C...
WWW
2010
ACM
15 years 11 months ago
Visualizing differences in web search algorithms using the expected weighted hoeffding distance
We introduce a new dissimilarity function for ranked lists, the expected weighted Hoeffding distance, that has several advantages over current dissimilarity measures for ranked s...
Mingxuan Sun, Guy Lebanon, Kevyn Collins-Thompson