Sciweavers

294 search results - page 41 / 59
» Interaction with the Reorderable Matrix
Sort
View
VIZSEC
2005
Springer
14 years 27 days ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...
CHI
2008
ACM
14 years 7 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
14 years 7 months ago
Modeling relationships at multiple scales to improve accuracy of large recommender systems
The collaborative filtering approach to recommender systems predicts user preferences for products or services by learning past useritem relationships. In this work, we propose no...
Robert M. Bell, Yehuda Koren, Chris Volinsky
IUI
2010
ACM
14 years 2 months ago
From documents to tasks: deriving user tasks from document usage patterns
A typical knowledge worker is involved in multiple tasks and switches frequently between them every work day. These frequent switches become expensive because each task switch req...
Oliver Brdiczka
ICPR
2008
IEEE
14 years 8 months ago
Online recognition of handwritten mathematical expressions with support for matrices
We present an online system for recognizing handwritten mathematical matrices in the context of an interactive computational tool called MathPaper. Automatic segmentation and reco...
Chuanjun Li, Robert C. Zeleznik, Timothy Miller, J...