Sciweavers

2521 search results - page 27 / 505
» Design and Evaluation in Visualization Research
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
CHI
2003
ACM
14 years 7 months ago
Mobile ADVICE: an accessible device for visually impaired capability enhancement
The visually impaired have limited access to the world of mobile devices. Our goal was to design a handheld mobile device to overcome limitations such as reliance on visual displa...
Robert A. Amar, Steven Dow, Richard Gordon, Muhamm...
AVI
2004
13 years 8 months ago
The challenge of information visualization evaluation
As the field of information visualization matures, the tools and ideas described in our research publications are reaching users. The reports of usability studies and controlled e...
Catherine Plaisant
ICASSP
2009
IEEE
14 years 2 months ago
Visual saliency with side information
We propose novel algorithms for organizing large image and video datasets using both the visual content and the associated sideinformation, such as time, location, authorship, and...
Wei Jiang, Lexing Xie, Shih-Fu Chang
TOMACS
1998
140views more  TOMACS 1998»
13 years 7 months ago
Technical Note: A Hierarchical Computer Architecture Design and Simulation Environment
architectures at multiple levels of abstraction, encompassing both hardware and software. It has five modes of operation (Design, Model Validation, Build Simulation, Simulate Syste...
Paul S. Coe, Fred W. Howell, Roland N. Ibbett, Lau...