Sciweavers

3506 search results - page 698 / 702
» Pattern recognition in information systems
Sort
View
UIST
2005
ACM
14 years 1 months ago
Automation and customization of rendered web pages
On the desktop, an application can expect to control its user interface down to the last pixel, but on the World Wide Web, a content provider has no control over how the client wi...
Michael Bolin, Matthew Webber, Philip Rha, Tom Wil...
VIZSEC
2005
Springer
14 years 1 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
ESORICS
2004
Springer
14 years 1 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
3DPVT
2002
IEEE
193views Visualization» more  3DPVT 2002»
14 years 24 days ago
Modeling shapes and textures from images: new frontiers
Increasingly, models of the world are directly built from images. The paper discusses a number of recent developments that try to push the enveloppe of what image-based modeling c...
Luc J. Van Gool, D. Vandemeulen, Gregor A. Kalbere...
VL
2002
IEEE
165views Visual Languages» more  VL 2002»
14 years 22 days ago
Co-Ordination of Multiple External Representations during Java Program Debugging
Java program debugging was investigated in computer science students who used a software debugging environment (SDE) that provided concurrently displayed, adjacent, multiple and l...
Pablo Romero, Rudi Lutz, Richard Cox, Benedict du ...