Sciweavers

135 search results - page 13 / 27
» Sesame: informing user security decisions with system visual...
Sort
View
VISUALIZATION
1999
IEEE
13 years 11 months ago
Visualization of Conflicts and Resolutions in a "Free Flight" Scenario
"Free Flight" will change today's air traffic control system by giving pilots increased flexibility to choose and modify their routes in real time, reducing costs a...
Ronald Azuma, Howard Neely, Michael Daily, Mario C...
CCS
2009
ACM
14 years 1 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
TVCG
2010
153views more  TVCG 2010»
13 years 5 months ago
A Visual Analytics Approach to Understanding Spatiotemporal Hotspots
As data sources become larger and more complex, the ability to effectively explore and analyze patterns amongst varying sources becomes a critical bottleneck in analytic reasoning...
Ross Maciejewski, Stephen Rudolph, Ryan Hafen, Ahm...
NAACL
2007
13 years 8 months ago
OMS-J: An Opinion Mining System for Japanese Weblog Reviews Using a Combination of Supervised and Unsupervised Approaches
We introduce a simple opinion mining system for analyzing Japanese Weblog reviews called OMS-J. OMS-J is designed to provide an intuitive visual GUI of opinion mining graphs for a...
Guangwei Wang, Kenji Araki
CCS
2010
ACM
13 years 5 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov