To see the other types of publications on this topic, follow the link: Visualization for computer security.

Dissertations / Theses on the topic 'Visualization for computer security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Visualization for computer security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Teoh, Soon Tee. "Interactive visualization techniques for computer network security /." For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2004. http://uclibs.org/PID/11984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Whitaker, Robert Bruce. "Applying Information Visualization to Computer Security Applications." DigitalCommons@USU, 2010. https://digitalcommons.usu.edu/etd/636.

Full text
Abstract:
This thesis presents two phases of research in applying visualization to network security challenges. The first phase included discovering the most useful and powerful features in existing computer security visualizations and incorporating them into the AdviseAid visualization platform, an existing software package. The incorporation of such a complete feature set required novel resolution of software engineering, human factors, and computer graphics issues. We also designed additional novel features, such as plugin interfaces, allowing for rapid prototyping and experimentation with novel v
APA, Harvard, Vancouver, ISO, and other styles
3

Luse, Andrew William. "Exploring utilization of visualization for computer and network security." [Ames, Iowa : Iowa State University], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abdullah, Kulsoom B. "Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10509.

Full text
Abstract:
As the trend of successful network attacks continue to rise, better forms of intrusion, detection and prevention are needed. This thesis addresses network traffic visualization techniques that aid administrators in recognizing attacks. A view of port statistics and Intrusion Detection System (IDS) alerts has been developed. Each help to address issues with analyzing large datasets involving networks. Due to the amount of traffic as well as the range of possible port numbers and IP addresses, scaling techniques are necessary. A port-based overview of network activity produces an improved r
APA, Harvard, Vancouver, ISO, and other styles
5

Nunnally, Troy J. "Advanced visualizations for network security." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52993.

Full text
Abstract:
Monitoring volumes of malicious network data for across multiple sources can potentially be overwhelming. As a result, vital data is at a greater risk of being overlooked and the time span for analyzing it could be too lengthy. One way to address this issue is to employ network security visualization techniques to evaluate security risks and identify malicious activity to help mitigate compromised nodes on a network. The purpose of this thesis is to introduce a visualization framework to help reduce task-completion time, enhance situational awareness, and decrease user error of complex visua
APA, Harvard, Vancouver, ISO, and other styles
6

Freet, David Nathan. "A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency." Thesis, Indiana State University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10261868.

Full text
Abstract:
<p> The flood of raw data generated by intrusion detection and other network monitoring devices can be so overwhelming that it causes great difficulty in detecting patterns that might indicate malicious traffic. In order to more effectively monitor and process network and forensic data within a virtualized environment, Security Visualization (SecViz) provides software-based visual interfaces to analyze live and logged network data within the domains of network security, network and cloud forensics, attack prevention, compliance management, wireless security, secure coding, and penetration test
APA, Harvard, Vancouver, ISO, and other styles
7

Kasemsri, Rawiroj Robert. "A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/17.

Full text
Abstract:
Network security visualization is a relatively new field and is quickly gaining momentum. Network security visualization allows the display and projection of the network or system data, in hope to efficiently monitor and protect the system from any intrusions or possible attacks. Intrusions and attacks are constantly continuing to increase in number, size, and complexity. Textually reading through log files or other textual sources is currently insufficient to secure a network or system. Using graphical visualization, security information is presented visually, and not only by text. Without ne
APA, Harvard, Vancouver, ISO, and other styles
8

Shirazi, Patrick. "Identifying Challenges in Cybersecurity Data Visualization Dashboards." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80412.

Full text
Abstract:
Nowadays, a massive amount of cybersecurity data-objects, such as security events, logs,messages, are flowing through different cybersecurity systems. With the enormous fastdevelopment of different cloud environments, big data, IoT, and so on, these amounts of data areincreasingly revolutionary. One of the challenges for different security actors, such as securityadmins, cybersecurity analysis, and network technicians, is how to utilize this amount of data inorder to reach meaningful insights, so they can be used further in diagnosis, validation, forensicand decision-making purposes. In order
APA, Harvard, Vancouver, ISO, and other styles
9

Musa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.

Full text
Abstract:
Increasing numbers of alerts produced by network intrusion detection systems (NIDS) have burdened the job of security analysts especially in identifying and responding to them. The tasks of exploring and analysing large quantities of communication network security data are also difficult. This thesis studied the application of visualisation in combination with alerts classifier to make the exploring and understanding of network security alerts data faster and easier. The prototype software, NSAViz, has been developed to visualise and to provide an intuitive presentation of the network security
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Hsiu-Chung. "Toward a Heuristic Model for Evaluating the Complexity of Computer Security Visualization Interface." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/35.

Full text
Abstract:
Computer security visualization has gained much attention in the research community in the past few years. However, the advancement in security visualization research has been hampered by the lack of standardization in visualization design, centralized datasets, and evaluation methods. We propose a new heuristic model for evaluating the complexity of computer security visualizations. This complexity evaluation method is designed to evaluate the efficiency of performing visual search in security visualizations in terms of measuring critical memory capacity load needed to perform such tasks. Our
APA, Harvard, Vancouver, ISO, and other styles
11

Conti, Gregory John. "Countering network level denial of information attacks using information visualization." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-03232006-112827/.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2006.<br>Stasko, John, Committee Member ; Owen, Henry, Committee Member ; Merkle, Ralph, Committee Member ; Lee, Wenke, Committee Member ; Ahamad, Mustaque, Committee Chair.
APA, Harvard, Vancouver, ISO, and other styles
12

Conti, Greg. "Countering network level denial of information attacks using information visualization /." Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-03232006-112827/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Abuaitah, Giovani Rimon. "Trusted Querying over Wireless Sensor Networks and Network Security Visualization." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1240163119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Fink, Glenn Allen. "Visual Correlation of Network Traffic and Host Processes for Computer Security." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/28770.

Full text
Abstract:
Much computer communications activity is invisible to the user, happening without explicit permission. When system administrators investigate network communications activities, they have difficulty tracing them back to the processes that cause them. The strictly layered TCP/IP networking model that underlies all widely used, general-purpose operating systems makes it impossible to trace a packet seen on the network back to the processes that are responsible for generating and receiving it. The TCP/IP model separates the concerns of network routing and process ownership so that the layers canno
APA, Harvard, Vancouver, ISO, and other styles
15

Gasant, Mogamad Yaqeen. "Firewall information and security visualization : improving the usage and adoption of modern network firewalls by novice users." Master's thesis, University of Cape Town, 2007. http://hdl.handle.net/11427/6398.

Full text
Abstract:
Word processed copy.<br>Includes bibliographical references (leaves 77-79).<br>The increasing number of people having access to computers and the Internet and the numerous services provided by the Internet - e.g., Internet banking, online shopping, eBay, email - emphasizes the need for computer security which is understandable to novice users. Whilst the technology underlying a firewall is effective, most users have no idea how to configure the software to suit their needs. This research focuses on personal firewalls because it is our belief and I will show that personal firewalls are more at
APA, Harvard, Vancouver, ISO, and other styles
16

Swart, Ignatius Petrus. "Pro-active visualization of cyber security on a National Level : a South African case study." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017940.

Full text
Abstract:
The need for increased national cyber security situational awareness is evident from the growing number of published national cyber security strategies. Governments are progressively seen as responsible for cyber security, but at the same time increasingly constrained by legal, privacy and resource considerations. Infrastructure and services that form part of the national cyber domain are often not under the control of government, necessitating the need for information sharing between governments and commercial partners. While sharing of security information is necessary, it typically requires
APA, Harvard, Vancouver, ISO, and other styles
17

Mahmood, Waqas, and Muhammad Faheem Akhtar. "Validation of Machine Learning and Visualization based Static Code Analysis Technique." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4347.

Full text
Abstract:
Software security has always been an afterthought in software development which results into insecure software. Companies rely on penetration testing for detecting security vulnerabilities in their software. However, incorporating security at early stage of development reduces cost and overhead. Static code analysis can be applied at implementation phase of software development life cycle. Applying machine learning and visualization for static code analysis is a novel idea. Technique can learn patterns by normalized compression distance NCD and classify source code into correct or faulty usage
APA, Harvard, Vancouver, ISO, and other styles
18

Conley, Thomas A. "Effective Programmatic Analysis of Network Flow Data for Security and Visualization using Higher-order Statistics and Domain Specific Embedded Languages." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1336482912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Lui, Nathan. "DependencyVis: Helping Developers Visualize Software Dependency Information." DigitalCommons@CalPoly, 2021. https://digitalcommons.calpoly.edu/theses/2270.

Full text
Abstract:
The use of dependencies have been increasing in popularity over the past decade, especially as package managers such as JavaScript's npm has made getting these packages a simple command to run. However, while incidents such as the left-pad incident has increased awareness of how vulnerable relying on these packages are, there is still some work to be done when it comes to getting developers to take the extra research step to determine if a package is up to standards. Finding metrics of different packages and comparing them is always a difficult and time consuming task, especially since potenti
APA, Harvard, Vancouver, ISO, and other styles
20

Alfredsson, Anders, and Gustav Larsson. "Lokalisering och visualisering av område : En smartphone-applikation för en ökad trygghetskänsla." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-51574.

Full text
Abstract:
Rapporten handlar om olika metoder för att lokalisera smartphones och skapandet av en Androidapplikation. Applikationen skulle visualisera Campusområdet vid Örebro universitet för att öka medvetenheten och säkerhetskänslan för personer som är där kvällar och nätter. Implementationen av systemet beskrivs tillsammans med de problem som uppstod, samt dess lösningar.<br>The report is about different methods of localizing smartphones and the creation of an Android application. The application should visualize the Campus for Örebro university to raise awareness and the sense of security for people w
APA, Harvard, Vancouver, ISO, and other styles
21

Kim, Tiffany Hyun-Jin. "All Trust Is Local: Empowering Users’ Authentication Decisions on the Internet." Research Showcase @ CMU, 2012. http://repository.cmu.edu/dissertations/132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Bedhammar, Jennifer, and Oliver Johansson. "Visualization of cyber security attacks." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167144.

Full text
Abstract:
The Swedish Defence Research Agency (FOI) simulates cyber attacks for research and education purposes in their cyber range, CRATE, with a system called SVED. This thesis describes the process of creating a visualization of the log files produced by SVED, with the purpose of increasing the users’ comprehension of the log files and thereby increasing their knowledge of the simulated attacks. To create an effective visualization a user study was held to know the users’ needs, experiences and requirements. Several designs were created based on the results and one was selected and refined using fee
APA, Harvard, Vancouver, ISO, and other styles
23

Crémilleux, Damien. "Visualization for information system security monitoring." Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0013.

Full text
Abstract:
Le centre opérationnel de sécurité, SOC, est un élément central pour la sécurité des systèmes d’information. Danscette thèse, nous nous intéressons à ses limites et proposons un nouveau processus et deux outils visuels pour yrépondre. Nos contributions permettent à la fois une meilleure collaboration entre les analystes travaillant ausein des SOCs, ainsi que de faciliter visuellement le triage des événements de sécurité au sein des systèmesd’informations<br>A security operations center, SOC, is a key element for the security of information systems. In this thesis, weexhibited the limitations o
APA, Harvard, Vancouver, ISO, and other styles
24

Leichtnam, Laetitia. "Detecting and visualizing anomalies in heterogeneous network events : Modeling events as graph structures and detecting communities and novelties with machine learning." Thesis, CentraleSupélec, 2020. http://www.theses.fr/2020CSUP0011.

Full text
Abstract:
L'objectif général de cette thèse est d'évaluer l'intérêt des graphes dans le domaine de l'analyse des données de sécurité.Nous proposons une approche de bout en bout composé d'un modèle unifié de données réseau sous forme de graphes, d'un système de découverte de communauté, d'un système de détection d'anomalies non supervisé et d'une visualisation des données sous forme de graphes. Le modèle unifié est obtenue en utilisant des graphes de connaissance pour représenter des journaux d'évènements hétérogènes ainsi que du trafic réseau. La détection de communautés permet de sélectionner des sous-
APA, Harvard, Vancouver, ISO, and other styles
25

PATEL, VALMIKI A. "COMPUTER AIDED DESIGN AND VISUALIZATION." The University of Arizona, 1994. http://hdl.handle.net/10150/555266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Memon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.

Full text
Abstract:
<p>WLANs are become popular due to their different advantages. Beside all these advantages WLANs are also facing the major problem of the security, so that why lots of people are doing research on WLAN to improve the security because many companies want to transfer their sensible data over WLAN.</p><p>This report discusses the security issues of WLAN based on IEEE 802.11 standard, such type of networks are referred to as wifi network. WLAN is deployed as an extension of already existed wired LAN. Therefore it is necessary to provide the security of WLAN equals to Wired LAN.</p><p>We worked in
APA, Harvard, Vancouver, ISO, and other styles
27

Chapman, Paul M. "Offshore marine visualization." Thesis, University of Hull, 2003. http://hydra.hull.ac.uk/resources/hull:6673.

Full text
Abstract:
In 85 B.C. a Greek philosopher called Posidonius set sail to answer an age-old question: how deep is the ocean? By lowering a large rock tied to a very long length of rope he determined that the ocean was 2km deep. These line and sinker methods were used until the 1920s when oceanographers developed the first echo sounders that could measure the water's depth by reflecting sound waves off the seafloor. The subsequent increase in sonar depth soundings resulted in oceanologists finally being able to view the alien underwater landscape. Paper printouts and records dominated the industry for decad
APA, Harvard, Vancouver, ISO, and other styles
28

Anderson, Ross John. "Robust computer security." Thesis, University of Cambridge, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Chang, Jiae. "A PERCEPTUAL VISUALIZATION ASSISTANT FOR MULTI-DIMENSIONAL DATA VISUALIZATION." NCSU, 2001. http://www.lib.ncsu.edu/etd/public/etd-32441612810132541/etd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Shaw, Jennifer Elizabeth. "Visualization tools for optimizing compilers." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98798.

Full text
Abstract:
Optimizing compilers have traditionally had little support for visual tools which display the vast amount of information generated and which could aid in the development of analyses and teaching and provide extra information to general programmers. This thesis presents a set of visualization tools which integrate visualization support for Soot, an optimizing compiler framework, into Eclipse, a popular, extensible IDE.<br>In particular, this work explores making the research compiler framework more accessible to new users and general programmers. Tools for displaying data flow analysis results
APA, Harvard, Vancouver, ISO, and other styles
31

Rekhi, Dipinder Singh. "Fluid visualization and fluid solvers." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98775.

Full text
Abstract:
Fluid visualization techniques and fluid solvers are widely used in computer graphics and scientific visualization. There is a wide variety of fluid visualization methods. We discuss in detail an important visualization technique known as the Line Integral Convolution (LIC). We perform an experiment to show how the LIC results are affected by the input parameter. We also discuss the nature of the fluid velocity field and provide a brief classification of various fluid visualization techniques.<br>This is followed by fluid solvers, which model the dynamics of the underlying fluid and are used t
APA, Harvard, Vancouver, ISO, and other styles
32

Haroun, Paul. "Genetic algorithm and data visualization." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0017/MQ37125.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Burchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.

Full text
Abstract:
Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of
APA, Harvard, Vancouver, ISO, and other styles
34

Besada, Jorge L. "Personal computer security system." FIU Digital Commons, 1993. http://digitalcommons.fiu.edu/etd/1707.

Full text
Abstract:
This work consists on the design and implementation of a complete monitored security system. Two computers make up the basic system: one computer is the transmitter and the other is the receiver. Both computers interconnect by modems. Depending on the status of the input sensors (magnetic contacts, motion detectors and others) the transmitter detects an alarm condition and sends a detailed report of the event via modem to the receiver computer.
APA, Harvard, Vancouver, ISO, and other styles
35

Altiero, Roberto A. "Digital Forensics Tool Interface Visualization." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/24.

Full text
Abstract:
Recent trends show digital devices utilized with increasing frequency in most crimes committed. Investigating crime involving these devices is labor-intensive for the practitioner applying digital forensics tools that present possible evidence with results displayed in tabular lists for manual review. This research investigates how enhanced digital forensics tool interface visualization techniques can be shown to improve the investigator's cognitive capacities to discover criminal evidence more efficiently. This paper presents visualization graphs and contrasts their properties with the output
APA, Harvard, Vancouver, ISO, and other styles
36

LI, Liya. "Advanced flow visualization." The Ohio State University, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=osu1196263993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Xu, Yinglai. "Fluid Interactive Information Visualization: A Visualization Tool for Book Recommendation." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-216941.

Full text
Abstract:
The accuracy of recommender systems has been largely discussed and the user experience of the recommended systems is now becoming a new focus. Combining recommendations with information visualization (InfoVis) can be a way to improve the acceptance of the system. This thesis investigates how InfoVis can support the recommended systems, aiming at improving the enjoyment and engagement of the user experience. Three prototypes are designed to evaluate the impact of using InfoVis and fluid interactive InfoVis on user engagement and enjoyment with exploratory of recommended books. The methods of pr
APA, Harvard, Vancouver, ISO, and other styles
38

Eichelbaum, Sebastian. "Applied Visualization in the Neurosciences and the Enhancement of Visualization through Computer Graphics." Doctoral thesis, Universitätsbibliothek Leipzig, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-157132.

Full text
Abstract:
The complexity and size of measured and simulated data in many fields of science is increasing constantly. The technical evolution allows for capturing smaller features and more complex structures in the data. To make this data accessible by the scientists, efficient and specialized visualization techniques are required. Maximum efficiency and value for the user can only be achieved by adapting visualization to the specific application area and the specific requirements of the scientific field. Part I: In the first part of my work, I address the visualization in the neurosciences. The neurosci
APA, Harvard, Vancouver, ISO, and other styles
39

Whitehorne, Andrew Ennis. "Telescope: A Multivariate Visualization Framework in Support of the Development of a Perceptual Visualization Hierarchy." NCSU, 2008. http://www.lib.ncsu.edu/theses/available/etd-12202007-122731/.

Full text
Abstract:
Scalability has become a major issue within the field of visualization as data gathering methodologies and display technologies diversify. To compensate for large data sets and display limitations, perceptual visualization techniques aim to optimize graphical data representations with human vision in mind. The following outlines the principles, motivations, and development behind the Telescope multivariate visualization framework. Telescope provides mechanisms for generating and manipulating visualizations in which the visual angle and display resolution of individual elements are of chief con
APA, Harvard, Vancouver, ISO, and other styles
40

Nordvik, Enar. "Computer visualization of wood : some important aspects /." Luleå, 2004. http://epubl.luth.se/1402-1757/2004/27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Barker, Dean. "Computer facial animation for sign language visualization." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/50300.

Full text
Abstract:
Thesis (MSc)--University of Stellenbosch, 2005.<br>ENGLISH ABSTRACT: Sign Language is a fully-fledged natural language possessing its own syntax and grammar; a fact which implies that the problem of machine translation from a spoken source language to Sign Language is at least as difficult as machine translation between two spoken languages. Sign Language, however, is communicated in a modality fundamentally different from all spoken languages. Machine translation to Sign Language is therefore burdened not only by a mapping from one syntax and grammar to another, but also, by a non-trivi
APA, Harvard, Vancouver, ISO, and other styles
42

Mihalik, Aaron D. (Aaron Daniel) 1980. "VISTA : a visualization tool for computer architects." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28449.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.<br>Includes bibliographical references (leaves 54-55).<br>As computer architectures continue to grow in complexity, software developers and hardware engineers cope with the increasing complexity by developing proprietary applications, simulations and tool sets to understand the behavior of these complex systems. Although the field of information visualization is leading to powerful applications in many areas, information visualization applications for computer architecture devel
APA, Harvard, Vancouver, ISO, and other styles
43

Nguyen, Huy (Huy Ngoc). "Supercomputing visualization made simple." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/43073.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.<br>Includes bibliographical references (p. [39]-[40]).<br>In this thesis, we propose a solution for remote visualization for supercomputers. Our solution consists of two tools that help users visualize data from high performance computers. The first one takes advantage of the Web and AJAX technology [25], is simple, light weight and does not require any pre-installation which can be a perfect tool for demonstration supercomputing data. The second tool, a 3D Viewer on MATLAB Star-P
APA, Harvard, Vancouver, ISO, and other styles
44

Jablonski, David A. "Visualization of lattice fields." Thesis, Massachusetts Institute of Technology, 1989. http://hdl.handle.net/1721.1/74809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Huang, Orton T. 1977. "Visualization tools for SpecTRM." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/28466.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.<br>Includes bibliographical references (leaves 82-83).<br>SpecTRM is a CAD system for digital automation. The intent of SpecTRM is to assist engineers in managing the requirements, design and evolution process aspects of developing software. The purpose of this thesis project is to extend SpecTRM even further through the development of visualization tools. This will consist of building tools in three general areas to increase the functionality of SpecTRM. These areas include pos
APA, Harvard, Vancouver, ISO, and other styles
46

Kainda, Ronald. "Usability and security of human-interactive security protocols." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.

Full text
Abstract:
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifically, how digests of 4 or more digits can be compared between two or more sys- tems as conveniently as possible while ensuring that issues such as user complacency do not compromise security. We address the research question: given different association scenarios and modes of authentication in HISPs, how can we improve on existing, or design new, empirical channels that suit human and contextual needs to achieve acceptable effective security? We review the literature of HISPs, proposed empirical
APA, Harvard, Vancouver, ISO, and other styles
47

Baratz, Joshua W. (Joshua William) 1981. "Regions Security Policy (RSP) : applying regions to network security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17933.

Full text
Abstract:
Thesis (M. Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.<br>Includes bibliographical references (p. 51-54).<br>The Regions network architecture is a new look at network organization that groups nodes into regions based on common purposes. This shift from strict network topology groupings of nodes requires a change in security systems. This thesis designs and implements the Regions Security Policy (RSP). RSP allows a unified security policy to be set across a region, fully controlling data as it enters into, exits from, and tr
APA, Harvard, Vancouver, ISO, and other styles
48

Wang, Qin 1977. "Evolve : an extensible software visualization framework." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79200.

Full text
Abstract:
Existing visualization tools typically do not provide a simple mechanism for adding new visualization techniques, and are often coupled with inflexible data input mechanisms. This thesis presents EVolve, a flexible and extensible framework for visualizing program characteristics and behaviour. The framework is flexible in the sense that it can visualize many kinds of data, and it is extensible in the sense that it is quite straightforward to add new kinds of visualizations.<br>The overall architecture of the framework consists of the core EVolve platform that communicates with data sour
APA, Harvard, Vancouver, ISO, and other styles
49

Erten, Cesim. "Simultaneous embedding and visualization of graphs." Diss., The University of Arizona, 2004. http://hdl.handle.net/10150/290066.

Full text
Abstract:
Graph embedding and visualization problems arise in relational information visualization. The two primary goals in graph visualization are drawings that convey the relationships in the underlying data and drawings that are aesthetically pleasing. Often, we have a series of related graphs that we would like to compare. In such cases it is also important to preserve the mental map between the drawings of different graphs so that the relationship between the graphs is clearly visible. For simultaneous drawing of graphs, we first present a linear-time algorithm to simultaneously embed a planar gra
APA, Harvard, Vancouver, ISO, and other styles
50

Edwards, Dennis Lee. "Accurate visualization of distributed system execution." W&M ScholarWorks, 1999. https://scholarworks.wm.edu/etd/1539623957.

Full text
Abstract:
The concurrent execution of processes in a distributed system makes the interactions between them difficult to understand. A clear image of the execution sequence that occurs as well as possible alternative scenarios is paramount to providing the software engineer the understanding needed to create reliable software.;In this thesis, we examine several representation methods of presenting a pictorial view of the execution of a distributed system and evaluate each in terms of three criteria. First, only those relationships that are created during the execution can and must be presented. Second,
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!