Sciweavers

739 search results - page 132 / 148
» Information Flow in Credential Systems
Sort
View
MSR
2005
ACM
14 years 1 months ago
Analysis of signature change patterns
Software continually changes due to performance improvements, new requirements, bug fixes, and adaptation to a changing operational environment. Common changes include modificatio...
Sunghun Kim, E. James Whitehead Jr., Jennifer Beva...
ICICS
2005
Springer
14 years 1 months ago
PCAV: Internet Attack Visualization on Parallel Coordinates
This paper presents PCAV (Parallel Coordinates Attack Visualizer), a real-time visualization system for detecting large-scale Internet attacks including Internet worms, DDoS attack...
Hyunsang Choi, Heejo Lee
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
14 years 27 days ago
Expanding Citizen Access and Public Official Accountability through Knowledge Creation Technology: One Recent Development in e-D
The authors describe an addition to the conversation regarding enhanced democracy through technologicallyassisted means (e-Democracy) focusing on enhancing and expanding the typic...
Michael A. Shires, Murray S. Craig
UIST
2000
ACM
13 years 12 months ago
Speed-dependent automatic zooming for browsing large documents
We propose a navigation technique for browsing large documents that integrates rate-based scrolling with automatic zooming. The view automatically zooms out when the user scrolls ...
Takeo Igarashi, Ken Hinckley
FPGA
1997
ACM
132views FPGA» more  FPGA 1997»
13 years 11 months ago
Wormhole Run-Time Reconfiguration
Configurable Computing Machines (CCMs) are an emerging class of computing platform which provide the computational performance benefits of ASICs, yet retain the flexibility and ra...
Ray Bittner, Peter M. Athanas