Sciweavers

326 search results - page 15 / 66
» Panda: A System for Provenance and Data
Sort
View
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
14 years 8 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
CG
2000
Springer
13 years 7 months ago
Procedural shape generation for multi-dimensional data visualization
Visualization of multi-dimensional data is a challenging task. The goal is not the display of multiple data dimensions, but user comprehension of the multi-dimensional data. This p...
David S. Ebert, Randall M. Rohrer, Christopher D. ...
DASFAA
2009
IEEE
151views Database» more  DASFAA 2009»
14 years 2 months ago
The Challenge of Assuring Data Trustworthiness
Abstract. With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institution...
Elisa Bertino, Chenyun Dai, Murat Kantarcioglu
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 2 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
WWW
2004
ACM
14 years 8 months ago
Semantic web applications to e-science in silico experiments
This paper explains our research and implementations of manual, automatic and deep annotations of provenance logs for e-Science in silico experiments. Compared to annotating gener...
Jun Zhao, Carole A. Goble, Robert Stevens