Sciweavers

134 search results - page 8 / 27
» ccs 2004
Sort
View
CCS
2004
ACM
14 years 3 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
CCS
2004
ACM
14 years 3 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
EGPGV
2004
Springer
143views Visualization» more  EGPGV 2004»
14 years 3 months ago
Massive Data Pre-Processing with a Cluster Based Approach
Data coming from complex simulation models reach easily dimensions much greater than available computational resources. Visualization of such data still represents the most intuit...
Rita Borgo, Valerio Pascucci, Roberto Scopigno
SGP
2004
14 years 6 days ago
Two Algorithms for Fast Reclustering of Dynamic Meshed Surfaces
Numerous mesh algorithms such as parametrization, radiosity, and collision detection require the decomposition of meshes into a series of clusters. In this paper we present two no...
Nathan A. Carr, John C. Hart
RT
2004
Springer
14 years 3 months ago
Feature-Based Textures
This paper introduces feature-based textures, a new image representation that combines features and samples for high-quality texture mapping. Features identify boundaries within a...
Ganesh Ramanarayanan, Kavita Bala, Bruce Walter