Sciweavers

961 search results - page 74 / 193
» Visual Cryptography on Graphs
Sort
View
IV
2002
IEEE
93views Visualization» more  IV 2002»
14 years 1 months ago
On Nearly Symmetric Drawings of Graphs
We propose a force-directed approach for drawing graphs in a nearly symmetric fashion. Our algorithm is built upon recent theoretical results on maximum symmetric subgraphs. Knowi...
Ming-Che Chuang, Hsu-Chun Yen
AI
2009
Springer
14 years 3 months ago
Exploratory Analysis of Co-Change Graphs for Code Refactoring
Abstract. Version Control Systems (VCS) have always played an essential role for developing reliable software. Recently, many new ways of utilizing the information hidden in VCS ha...
Hassan Khosravi, Recep Colak
VIZSEC
2005
Springer
14 years 1 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...
IV
2007
IEEE
105views Visualization» more  IV 2007»
14 years 2 months ago
Mapping a Local Web Domain
In this study, we crawled a local Web domain, created its graph representation, and analyzed the network structure. The results of network analysis revealed local scalefree patter...
Weimao Ke, Tiago Simas
TVCG
2008
135views more  TVCG 2008»
13 years 8 months ago
Relation-Aware Volume Exploration Pipeline
Volume exploration is an important issue in scientific visualization. Research on volume exploration has been focused on revealing hidden structures in volumetric data. While the i...
Ming-Yuen Chan, Huamin Qu, Ka-Kei Chung, Wai-Ho Ma...