Sciweavers

477 search results - page 49 / 96
» Guideline: Multiple Hierarchies
Sort
View
SECRYPT
2010
129views Business» more  SECRYPT 2010»
13 years 5 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...
VIZSEC
2005
Springer
14 years 1 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
COOPIS
2002
IEEE
14 years 21 days ago
Well-Founded Optimism: Inheritance in Frame-Based Knowledge Bases
Abstract. F-logic is a popular formalism for knowledge-intensive applications and, especially, for ontology management in Semantic Web. However, the original F-logic’s semantics ...
Guizhen Yang, Michael Kifer
UIST
1997
ACM
13 years 12 months ago
Elastic Windows: A Hierarchical Multi-Window World-Wide Web Browser
The World-Wide Web is becoming an invaluable source for the information needs of many users. However, current browsers are still primitive, in that they do not support many of the...
Eser Kandogan, Ben Shneiderman
CLUSTER
2004
IEEE
13 years 11 months ago
Communicating efficiently on cluster based grids with MPICH-VMI
Emerging infrastructure of computational grids composed of Clusters-of-Clusters (CoC) interlinked through high throughput channels promises unprecedented raw compute power for ter...
Avneesh Pant, Hassan Jafri