Sciweavers

135 search results - page 17 / 27
» Sesame: informing user security decisions with system visual...
Sort
View
SACMAT
2010
ACM
13 years 11 months ago
A model of triangulating environments for policy authoring
Policy authors typically reconcile several different mental models and goals, such as enabling collaboration, securing information, and conveying trust in colleagues. The data un...
Kathi Fisler, Shriram Krishnamurthi
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 6 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
CGI
1999
IEEE
13 years 11 months ago
Visualizing Knowledge about Virtual Reconstructions of Ancient Architecture
One of the assumptions of current software for visualizing architecture is that the underlying geometry is a correct, objective, and complete representation of the objects in ques...
Thomas Strothotte, Maic Masuch, Tobias Isenberg
KDD
1997
ACM
128views Data Mining» more  KDD 1997»
13 years 11 months ago
An Interactive Visualization Environment for Data Exploration
Exploratory data analysis is a process of sifting through data in search of interesting information or patterns. Analysts’ current tools for exploring data include database mana...
Mark Derthick, John Kolojejchick, Steven F. Roth
ADHOC
2007
133views more  ADHOC 2007»
13 years 6 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...