Siga este enlace para ver otros tipos de publicaciones sobre el tema: Visualization for computer security.

Tesis sobre el tema "Visualization for computer security"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores tesis para su investigación sobre el tema "Visualization for computer security".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Teoh, Soon Tee. "Interactive visualization techniques for computer network security /." For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2004. http://uclibs.org/PID/11984.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Whitaker, Robert Bruce. "Applying Information Visualization to Computer Security Applications." DigitalCommons@USU, 2010. https://digitalcommons.usu.edu/etd/636.

Texto completo
Resumen
This thesis presents two phases of research in applying visualization to network security challenges. The first phase included discovering the most useful and powerful features in existing computer security visualizations and incorporating them into the AdviseAid visualization platform, an existing software package. The incorporation of such a complete feature set required novel resolution of software engineering, human factors, and computer graphics issues. We also designed additional novel features, such as plugin interfaces, allowing for rapid prototyping and experimentation with novel v
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Luse, Andrew William. "Exploring utilization of visualization for computer and network security." [Ames, Iowa : Iowa State University], 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Abdullah, Kulsoom B. "Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10509.

Texto completo
Resumen
As the trend of successful network attacks continue to rise, better forms of intrusion, detection and prevention are needed. This thesis addresses network traffic visualization techniques that aid administrators in recognizing attacks. A view of port statistics and Intrusion Detection System (IDS) alerts has been developed. Each help to address issues with analyzing large datasets involving networks. Due to the amount of traffic as well as the range of possible port numbers and IP addresses, scaling techniques are necessary. A port-based overview of network activity produces an improved r
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Nunnally, Troy J. "Advanced visualizations for network security." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52993.

Texto completo
Resumen
Monitoring volumes of malicious network data for across multiple sources can potentially be overwhelming. As a result, vital data is at a greater risk of being overlooked and the time span for analyzing it could be too lengthy. One way to address this issue is to employ network security visualization techniques to evaluate security risks and identify malicious activity to help mitigate compromised nodes on a network. The purpose of this thesis is to introduce a visualization framework to help reduce task-completion time, enhance situational awareness, and decrease user error of complex visua
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Freet, David Nathan. "A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency." Thesis, Indiana State University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10261868.

Texto completo
Resumen
<p> The flood of raw data generated by intrusion detection and other network monitoring devices can be so overwhelming that it causes great difficulty in detecting patterns that might indicate malicious traffic. In order to more effectively monitor and process network and forensic data within a virtualized environment, Security Visualization (SecViz) provides software-based visual interfaces to analyze live and logged network data within the domains of network security, network and cloud forensics, attack prevention, compliance management, wireless security, secure coding, and penetration test
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Kasemsri, Rawiroj Robert. "A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/17.

Texto completo
Resumen
Network security visualization is a relatively new field and is quickly gaining momentum. Network security visualization allows the display and projection of the network or system data, in hope to efficiently monitor and protect the system from any intrusions or possible attacks. Intrusions and attacks are constantly continuing to increase in number, size, and complexity. Textually reading through log files or other textual sources is currently insufficient to secure a network or system. Using graphical visualization, security information is presented visually, and not only by text. Without ne
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Shirazi, Patrick. "Identifying Challenges in Cybersecurity Data Visualization Dashboards." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80412.

Texto completo
Resumen
Nowadays, a massive amount of cybersecurity data-objects, such as security events, logs,messages, are flowing through different cybersecurity systems. With the enormous fastdevelopment of different cloud environments, big data, IoT, and so on, these amounts of data areincreasingly revolutionary. One of the challenges for different security actors, such as securityadmins, cybersecurity analysis, and network technicians, is how to utilize this amount of data inorder to reach meaningful insights, so they can be used further in diagnosis, validation, forensicand decision-making purposes. In order
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Musa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.

Texto completo
Resumen
Increasing numbers of alerts produced by network intrusion detection systems (NIDS) have burdened the job of security analysts especially in identifying and responding to them. The tasks of exploring and analysing large quantities of communication network security data are also difficult. This thesis studied the application of visualisation in combination with alerts classifier to make the exploring and understanding of network security alerts data faster and easier. The prototype software, NSAViz, has been developed to visualise and to provide an intuitive presentation of the network security
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Wang, Hsiu-Chung. "Toward a Heuristic Model for Evaluating the Complexity of Computer Security Visualization Interface." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/35.

Texto completo
Resumen
Computer security visualization has gained much attention in the research community in the past few years. However, the advancement in security visualization research has been hampered by the lack of standardization in visualization design, centralized datasets, and evaluation methods. We propose a new heuristic model for evaluating the complexity of computer security visualizations. This complexity evaluation method is designed to evaluate the efficiency of performing visual search in security visualizations in terms of measuring critical memory capacity load needed to perform such tasks. Our
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Conti, Gregory John. "Countering network level denial of information attacks using information visualization." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-03232006-112827/.

Texto completo
Resumen
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2006.<br>Stasko, John, Committee Member ; Owen, Henry, Committee Member ; Merkle, Ralph, Committee Member ; Lee, Wenke, Committee Member ; Ahamad, Mustaque, Committee Chair.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Conti, Greg. "Countering network level denial of information attacks using information visualization /." Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-03232006-112827/.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Abuaitah, Giovani Rimon. "Trusted Querying over Wireless Sensor Networks and Network Security Visualization." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1240163119.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Fink, Glenn Allen. "Visual Correlation of Network Traffic and Host Processes for Computer Security." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/28770.

Texto completo
Resumen
Much computer communications activity is invisible to the user, happening without explicit permission. When system administrators investigate network communications activities, they have difficulty tracing them back to the processes that cause them. The strictly layered TCP/IP networking model that underlies all widely used, general-purpose operating systems makes it impossible to trace a packet seen on the network back to the processes that are responsible for generating and receiving it. The TCP/IP model separates the concerns of network routing and process ownership so that the layers canno
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Gasant, Mogamad Yaqeen. "Firewall information and security visualization : improving the usage and adoption of modern network firewalls by novice users." Master's thesis, University of Cape Town, 2007. http://hdl.handle.net/11427/6398.

Texto completo
Resumen
Word processed copy.<br>Includes bibliographical references (leaves 77-79).<br>The increasing number of people having access to computers and the Internet and the numerous services provided by the Internet - e.g., Internet banking, online shopping, eBay, email - emphasizes the need for computer security which is understandable to novice users. Whilst the technology underlying a firewall is effective, most users have no idea how to configure the software to suit their needs. This research focuses on personal firewalls because it is our belief and I will show that personal firewalls are more at
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Swart, Ignatius Petrus. "Pro-active visualization of cyber security on a National Level : a South African case study." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017940.

Texto completo
Resumen
The need for increased national cyber security situational awareness is evident from the growing number of published national cyber security strategies. Governments are progressively seen as responsible for cyber security, but at the same time increasingly constrained by legal, privacy and resource considerations. Infrastructure and services that form part of the national cyber domain are often not under the control of government, necessitating the need for information sharing between governments and commercial partners. While sharing of security information is necessary, it typically requires
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Mahmood, Waqas, and Muhammad Faheem Akhtar. "Validation of Machine Learning and Visualization based Static Code Analysis Technique." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4347.

Texto completo
Resumen
Software security has always been an afterthought in software development which results into insecure software. Companies rely on penetration testing for detecting security vulnerabilities in their software. However, incorporating security at early stage of development reduces cost and overhead. Static code analysis can be applied at implementation phase of software development life cycle. Applying machine learning and visualization for static code analysis is a novel idea. Technique can learn patterns by normalized compression distance NCD and classify source code into correct or faulty usage
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Conley, Thomas A. "Effective Programmatic Analysis of Network Flow Data for Security and Visualization using Higher-order Statistics and Domain Specific Embedded Languages." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1336482912.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Lui, Nathan. "DependencyVis: Helping Developers Visualize Software Dependency Information." DigitalCommons@CalPoly, 2021. https://digitalcommons.calpoly.edu/theses/2270.

Texto completo
Resumen
The use of dependencies have been increasing in popularity over the past decade, especially as package managers such as JavaScript's npm has made getting these packages a simple command to run. However, while incidents such as the left-pad incident has increased awareness of how vulnerable relying on these packages are, there is still some work to be done when it comes to getting developers to take the extra research step to determine if a package is up to standards. Finding metrics of different packages and comparing them is always a difficult and time consuming task, especially since potenti
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Alfredsson, Anders, and Gustav Larsson. "Lokalisering och visualisering av område : En smartphone-applikation för en ökad trygghetskänsla." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-51574.

Texto completo
Resumen
Rapporten handlar om olika metoder för att lokalisera smartphones och skapandet av en Androidapplikation. Applikationen skulle visualisera Campusområdet vid Örebro universitet för att öka medvetenheten och säkerhetskänslan för personer som är där kvällar och nätter. Implementationen av systemet beskrivs tillsammans med de problem som uppstod, samt dess lösningar.<br>The report is about different methods of localizing smartphones and the creation of an Android application. The application should visualize the Campus for Örebro university to raise awareness and the sense of security for people w
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Kim, Tiffany Hyun-Jin. "All Trust Is Local: Empowering Users’ Authentication Decisions on the Internet." Research Showcase @ CMU, 2012. http://repository.cmu.edu/dissertations/132.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Bedhammar, Jennifer, and Oliver Johansson. "Visualization of cyber security attacks." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167144.

Texto completo
Resumen
The Swedish Defence Research Agency (FOI) simulates cyber attacks for research and education purposes in their cyber range, CRATE, with a system called SVED. This thesis describes the process of creating a visualization of the log files produced by SVED, with the purpose of increasing the users’ comprehension of the log files and thereby increasing their knowledge of the simulated attacks. To create an effective visualization a user study was held to know the users’ needs, experiences and requirements. Several designs were created based on the results and one was selected and refined using fee
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Crémilleux, Damien. "Visualization for information system security monitoring." Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0013.

Texto completo
Resumen
Le centre opérationnel de sécurité, SOC, est un élément central pour la sécurité des systèmes d’information. Danscette thèse, nous nous intéressons à ses limites et proposons un nouveau processus et deux outils visuels pour yrépondre. Nos contributions permettent à la fois une meilleure collaboration entre les analystes travaillant ausein des SOCs, ainsi que de faciliter visuellement le triage des événements de sécurité au sein des systèmesd’informations<br>A security operations center, SOC, is a key element for the security of information systems. In this thesis, weexhibited the limitations o
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Leichtnam, Laetitia. "Detecting and visualizing anomalies in heterogeneous network events : Modeling events as graph structures and detecting communities and novelties with machine learning." Thesis, CentraleSupélec, 2020. http://www.theses.fr/2020CSUP0011.

Texto completo
Resumen
L'objectif général de cette thèse est d'évaluer l'intérêt des graphes dans le domaine de l'analyse des données de sécurité.Nous proposons une approche de bout en bout composé d'un modèle unifié de données réseau sous forme de graphes, d'un système de découverte de communauté, d'un système de détection d'anomalies non supervisé et d'une visualisation des données sous forme de graphes. Le modèle unifié est obtenue en utilisant des graphes de connaissance pour représenter des journaux d'évènements hétérogènes ainsi que du trafic réseau. La détection de communautés permet de sélectionner des sous-
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

PATEL, VALMIKI A. "COMPUTER AIDED DESIGN AND VISUALIZATION." The University of Arizona, 1994. http://hdl.handle.net/10150/555266.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Memon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.

Texto completo
Resumen
<p>WLANs are become popular due to their different advantages. Beside all these advantages WLANs are also facing the major problem of the security, so that why lots of people are doing research on WLAN to improve the security because many companies want to transfer their sensible data over WLAN.</p><p>This report discusses the security issues of WLAN based on IEEE 802.11 standard, such type of networks are referred to as wifi network. WLAN is deployed as an extension of already existed wired LAN. Therefore it is necessary to provide the security of WLAN equals to Wired LAN.</p><p>We worked in
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Chapman, Paul M. "Offshore marine visualization." Thesis, University of Hull, 2003. http://hydra.hull.ac.uk/resources/hull:6673.

Texto completo
Resumen
In 85 B.C. a Greek philosopher called Posidonius set sail to answer an age-old question: how deep is the ocean? By lowering a large rock tied to a very long length of rope he determined that the ocean was 2km deep. These line and sinker methods were used until the 1920s when oceanographers developed the first echo sounders that could measure the water's depth by reflecting sound waves off the seafloor. The subsequent increase in sonar depth soundings resulted in oceanologists finally being able to view the alien underwater landscape. Paper printouts and records dominated the industry for decad
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Anderson, Ross John. "Robust computer security." Thesis, University of Cambridge, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338198.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Chang, Jiae. "A PERCEPTUAL VISUALIZATION ASSISTANT FOR MULTI-DIMENSIONAL DATA VISUALIZATION." NCSU, 2001. http://www.lib.ncsu.edu/etd/public/etd-32441612810132541/etd.pdf.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Shaw, Jennifer Elizabeth. "Visualization tools for optimizing compilers." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98798.

Texto completo
Resumen
Optimizing compilers have traditionally had little support for visual tools which display the vast amount of information generated and which could aid in the development of analyses and teaching and provide extra information to general programmers. This thesis presents a set of visualization tools which integrate visualization support for Soot, an optimizing compiler framework, into Eclipse, a popular, extensible IDE.<br>In particular, this work explores making the research compiler framework more accessible to new users and general programmers. Tools for displaying data flow analysis results
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Rekhi, Dipinder Singh. "Fluid visualization and fluid solvers." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98775.

Texto completo
Resumen
Fluid visualization techniques and fluid solvers are widely used in computer graphics and scientific visualization. There is a wide variety of fluid visualization methods. We discuss in detail an important visualization technique known as the Line Integral Convolution (LIC). We perform an experiment to show how the LIC results are affected by the input parameter. We also discuss the nature of the fluid velocity field and provide a brief classification of various fluid visualization techniques.<br>This is followed by fluid solvers, which model the dynamics of the underlying fluid and are used t
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Haroun, Paul. "Genetic algorithm and data visualization." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0017/MQ37125.pdf.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Burchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.

Texto completo
Resumen
Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Besada, Jorge L. "Personal computer security system." FIU Digital Commons, 1993. http://digitalcommons.fiu.edu/etd/1707.

Texto completo
Resumen
This work consists on the design and implementation of a complete monitored security system. Two computers make up the basic system: one computer is the transmitter and the other is the receiver. Both computers interconnect by modems. Depending on the status of the input sensors (magnetic contacts, motion detectors and others) the transmitter detects an alarm condition and sends a detailed report of the event via modem to the receiver computer.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Altiero, Roberto A. "Digital Forensics Tool Interface Visualization." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/24.

Texto completo
Resumen
Recent trends show digital devices utilized with increasing frequency in most crimes committed. Investigating crime involving these devices is labor-intensive for the practitioner applying digital forensics tools that present possible evidence with results displayed in tabular lists for manual review. This research investigates how enhanced digital forensics tool interface visualization techniques can be shown to improve the investigator's cognitive capacities to discover criminal evidence more efficiently. This paper presents visualization graphs and contrasts their properties with the output
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

LI, Liya. "Advanced flow visualization." The Ohio State University, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=osu1196263993.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Xu, Yinglai. "Fluid Interactive Information Visualization: A Visualization Tool for Book Recommendation." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-216941.

Texto completo
Resumen
The accuracy of recommender systems has been largely discussed and the user experience of the recommended systems is now becoming a new focus. Combining recommendations with information visualization (InfoVis) can be a way to improve the acceptance of the system. This thesis investigates how InfoVis can support the recommended systems, aiming at improving the enjoyment and engagement of the user experience. Three prototypes are designed to evaluate the impact of using InfoVis and fluid interactive InfoVis on user engagement and enjoyment with exploratory of recommended books. The methods of pr
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Eichelbaum, Sebastian. "Applied Visualization in the Neurosciences and the Enhancement of Visualization through Computer Graphics." Doctoral thesis, Universitätsbibliothek Leipzig, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-157132.

Texto completo
Resumen
The complexity and size of measured and simulated data in many fields of science is increasing constantly. The technical evolution allows for capturing smaller features and more complex structures in the data. To make this data accessible by the scientists, efficient and specialized visualization techniques are required. Maximum efficiency and value for the user can only be achieved by adapting visualization to the specific application area and the specific requirements of the scientific field. Part I: In the first part of my work, I address the visualization in the neurosciences. The neurosci
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Whitehorne, Andrew Ennis. "Telescope: A Multivariate Visualization Framework in Support of the Development of a Perceptual Visualization Hierarchy." NCSU, 2008. http://www.lib.ncsu.edu/theses/available/etd-12202007-122731/.

Texto completo
Resumen
Scalability has become a major issue within the field of visualization as data gathering methodologies and display technologies diversify. To compensate for large data sets and display limitations, perceptual visualization techniques aim to optimize graphical data representations with human vision in mind. The following outlines the principles, motivations, and development behind the Telescope multivariate visualization framework. Telescope provides mechanisms for generating and manipulating visualizations in which the visual angle and display resolution of individual elements are of chief con
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Nordvik, Enar. "Computer visualization of wood : some important aspects /." Luleå, 2004. http://epubl.luth.se/1402-1757/2004/27.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Barker, Dean. "Computer facial animation for sign language visualization." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/50300.

Texto completo
Resumen
Thesis (MSc)--University of Stellenbosch, 2005.<br>ENGLISH ABSTRACT: Sign Language is a fully-fledged natural language possessing its own syntax and grammar; a fact which implies that the problem of machine translation from a spoken source language to Sign Language is at least as difficult as machine translation between two spoken languages. Sign Language, however, is communicated in a modality fundamentally different from all spoken languages. Machine translation to Sign Language is therefore burdened not only by a mapping from one syntax and grammar to another, but also, by a non-trivi
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Mihalik, Aaron D. (Aaron Daniel) 1980. "VISTA : a visualization tool for computer architects." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28449.

Texto completo
Resumen
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.<br>Includes bibliographical references (leaves 54-55).<br>As computer architectures continue to grow in complexity, software developers and hardware engineers cope with the increasing complexity by developing proprietary applications, simulations and tool sets to understand the behavior of these complex systems. Although the field of information visualization is leading to powerful applications in many areas, information visualization applications for computer architecture devel
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Nguyen, Huy (Huy Ngoc). "Supercomputing visualization made simple." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/43073.

Texto completo
Resumen
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.<br>Includes bibliographical references (p. [39]-[40]).<br>In this thesis, we propose a solution for remote visualization for supercomputers. Our solution consists of two tools that help users visualize data from high performance computers. The first one takes advantage of the Web and AJAX technology [25], is simple, light weight and does not require any pre-installation which can be a perfect tool for demonstration supercomputing data. The second tool, a 3D Viewer on MATLAB Star-P
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Jablonski, David A. "Visualization of lattice fields." Thesis, Massachusetts Institute of Technology, 1989. http://hdl.handle.net/1721.1/74809.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Huang, Orton T. 1977. "Visualization tools for SpecTRM." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/28466.

Texto completo
Resumen
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.<br>Includes bibliographical references (leaves 82-83).<br>SpecTRM is a CAD system for digital automation. The intent of SpecTRM is to assist engineers in managing the requirements, design and evolution process aspects of developing software. The purpose of this thesis project is to extend SpecTRM even further through the development of visualization tools. This will consist of building tools in three general areas to increase the functionality of SpecTRM. These areas include pos
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Kainda, Ronald. "Usability and security of human-interactive security protocols." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.

Texto completo
Resumen
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifically, how digests of 4 or more digits can be compared between two or more sys- tems as conveniently as possible while ensuring that issues such as user complacency do not compromise security. We address the research question: given different association scenarios and modes of authentication in HISPs, how can we improve on existing, or design new, empirical channels that suit human and contextual needs to achieve acceptable effective security? We review the literature of HISPs, proposed empirical
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Baratz, Joshua W. (Joshua William) 1981. "Regions Security Policy (RSP) : applying regions to network security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17933.

Texto completo
Resumen
Thesis (M. Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.<br>Includes bibliographical references (p. 51-54).<br>The Regions network architecture is a new look at network organization that groups nodes into regions based on common purposes. This shift from strict network topology groupings of nodes requires a change in security systems. This thesis designs and implements the Regions Security Policy (RSP). RSP allows a unified security policy to be set across a region, fully controlling data as it enters into, exits from, and tr
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Wang, Qin 1977. "Evolve : an extensible software visualization framework." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79200.

Texto completo
Resumen
Existing visualization tools typically do not provide a simple mechanism for adding new visualization techniques, and are often coupled with inflexible data input mechanisms. This thesis presents EVolve, a flexible and extensible framework for visualizing program characteristics and behaviour. The framework is flexible in the sense that it can visualize many kinds of data, and it is extensible in the sense that it is quite straightforward to add new kinds of visualizations.<br>The overall architecture of the framework consists of the core EVolve platform that communicates with data sour
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Erten, Cesim. "Simultaneous embedding and visualization of graphs." Diss., The University of Arizona, 2004. http://hdl.handle.net/10150/290066.

Texto completo
Resumen
Graph embedding and visualization problems arise in relational information visualization. The two primary goals in graph visualization are drawings that convey the relationships in the underlying data and drawings that are aesthetically pleasing. Often, we have a series of related graphs that we would like to compare. In such cases it is also important to preserve the mental map between the drawings of different graphs so that the relationship between the graphs is clearly visible. For simultaneous drawing of graphs, we first present a linear-time algorithm to simultaneously embed a planar gra
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Edwards, Dennis Lee. "Accurate visualization of distributed system execution." W&M ScholarWorks, 1999. https://scholarworks.wm.edu/etd/1539623957.

Texto completo
Resumen
The concurrent execution of processes in a distributed system makes the interactions between them difficult to understand. A clear image of the execution sequence that occurs as well as possible alternative scenarios is paramount to providing the software engineer the understanding needed to create reliable software.;In this thesis, we examine several representation methods of presenting a pictorial view of the execution of a distributed system and evaluate each in terms of three criteria. First, only those relationships that are created during the execution can and must be presented. Second,
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!