Sciweavers

462 search results - page 47 / 93
» Information visualization for an intrusion detection system
Sort
View
DSN
2008
IEEE
14 years 2 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
13 years 12 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
CAIVD
1998
182views more  CAIVD 1998»
13 years 9 months ago
Content-Based 3D Neuroradiologic Image Retrieval: Preliminary Results
A content-based 3D neuroradiologic image retrieval system is being developed at the Robotics Institute of CMU. The special characteristics of this system include: 1 directly deali...
Yanxi Liu, William E. Rothfus, Takeo Kanade
VIS
2007
IEEE
150views Visualization» more  VIS 2007»
14 years 9 months ago
Quantitative Effectiveness Metrics for Direct Volume Rendering
The effectiveness of direct volume rendering is difficult to validate and users may not know whether they have successfully explored the data or not. This limits its applications....
Yingcai Wu, Huamin Qu, Ka-Kei Chung, Wai-Ho Mak...
IADIS
2004
13 years 9 months ago
Future of Traffic Information: Online-Simulation of a Large Scale Freeway Network
Detailed and reliable information about the current traffic state is hardly obtainable by the road user. Therefore, we propose a web based visualization of the current and future ...
Florian Mazur, Roland Chrobok, Sigurdur F. Hafstei...