Sciweavers

129 search results - page 11 / 26
» User- and job-centric monitoring: Analysing and presenting l...
Sort
View
SOUPS
2005
ACM
14 years 1 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
ICMCS
2007
IEEE
111views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Multimodal Diaries
Time management is an important aspect of a successful professional life. In order to have a better understanding of where our time goes, we propose a system that summarizes the u...
Fernando De la Torre, Carlos Agell
HPDC
2007
IEEE
13 years 11 months ago
MOB: zero-configuration high-throughput multicasting for grid applications
Grid applications often need to distribute large amounts of data efficiently from one cluster to multiple others (multicast). Existing methods usually arrange nodes in optimized t...
Mathijs den Burger, Thilo Kielmann
SASO
2008
IEEE
14 years 2 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
14 years 19 days ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....