Sciweavers

961 search results - page 58 / 193
» Visual Cryptography on Graphs
Sort
View
VIZSEC
2007
Springer
15 years 8 months ago
Visualization of Host Behavior for Network Security
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...
F. Mansman, L. Meier, Daniel A. Keim
112
Voted
VL
1994
IEEE
147views Visual Languages» more  VL 1994»
15 years 6 months ago
Role of Visual Languages in Developing Image Analysis Algorithms
Developers of new imageanalysis algorithmstypically require an interactive environment in which the imagedata can be passed through various operators, some of which may involve fe...
M. Stella Atkins, Torre Zuk, B. Johnston, T. Arden
133
Voted
BIODATAMINING
2008
119views more  BIODATAMINING 2008»
15 years 2 months ago
A survey of visualization tools for biological network analysis
The analysis and interpretation of relationships between biological molecules, networks and concepts is becoming a major bottleneck in systems biology. Very often the pure amount ...
Georgios A. Pavlopoulos, Anna-Lynn Wegener, Reinha...
SOFTVIS
2010
ACM
15 years 24 days ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl
105
Voted
ESA
2009
Springer
149views Algorithms» more  ESA 2009»
15 years 9 months ago
Sparse Cut Projections in Graph Streams
Finding sparse cuts is an important tool for analyzing large graphs that arise in practice, such as the web graph, online social communities, and VLSI circuits. When dealing with s...
Atish Das Sarma, Sreenivas Gollapudi, Rina Panigra...