Sciweavers

461 search results - page 50 / 93
» Fundamentals of concern manipulation
Sort
View
PST
2004
13 years 9 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
CORR
2008
Springer
136views Education» more  CORR 2008»
13 years 7 months ago
Matrix Graph Grammars
Graph transformation is concerned with the manipulation of graphs by means of rules. Graph grammars have been traditionally studied using techniques from category theory. In previ...
Pedro Pablo Pérez Velasco
MICS
2008
103views more  MICS 2008»
13 years 7 months ago
The Freedom to Extend OpenMath and its Utility
Abstract. OpenMath [6] is a standard for representing the semantics of mathematical objects. It differs from Presentation MathML [8] in not being directly concerned with the presen...
James H. Davenport, Paul Libbrecht
PERVASIVE
2006
Springer
13 years 7 months ago
Keep Your Eyes on the Road and Your Finger on the Trigger - Designing for Mixed Focus of Attention in a Mobile Game for Brief En
In this paper we present an initial user feedback study of the Road Rager prototype. Road Rager is a mixed reality game, designed to enable passengers in different cars to play aga...
Liselott Brunnberg, Oskar Juhlin
CONCURRENCY
2000
101views more  CONCURRENCY 2000»
13 years 7 months ago
Jaguar: enabling efficient communication and I/O in Java
Implementing efficient communication and I/O mechanisms in Java requires both fast access to lowlevel system resources (such as network and raw disk interfaces) and direct manipul...
Matt Welsh, David E. Culler