Sciweavers

3006 search results - page 536 / 602
» Overview
Sort
View
VIZSEC
2005
Springer
14 years 4 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
VIZSEC
2005
Springer
14 years 4 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
WAOA
2005
Springer
177views Algorithms» more  WAOA 2005»
14 years 4 months ago
Approximation and Complexity of k-Splittable Flows
Given a graph with a source and a sink node, the NP–hard maximum k–splittable flow (MkSF) problem is to find a flow of maximum value with a flow decomposition using at most...
Ronald Koch, Martin Skutella, Ines Spenke
ACMDIS
2004
ACM
14 years 4 months ago
Sharing multimedia content with interactive public displays: a case study
The Plasma Posters are large screen, digital, interactive posterboards designed for informal content sharing within teams, groups, organizations and communities. Leveraging the fa...
Elizabeth F. Churchill, Les Nelson, Laurent Denoue...
ASSETS
2004
ACM
14 years 4 months ago
Accessibility designer: visualizing usability for the blind
These days, accessibility-related regulations and guidelines have been accelerating the improvement of Web accessibility. One of the accelerating factors is the development and de...
Hironobu Takagi, Chieko Asakawa, Kentarou Fukuda, ...