-
2
-
-
0016557674
-
Multidimensional Binary Search Trees Used for Associative Search
-
John Bentley. Multidimensional Binary Search Trees Used for Associative Search. Communications of the ACM, 18(9):509-516, 1975.
-
(1975)
Communications of the ACM
, vol.18
, Issue.9
, pp. 509-516
-
-
Bentley, J.1
-
5
-
-
0032090806
-
Bitmap index design and evaluation
-
New York, NY, USA, ACM press
-
C.-Y. Chan and Y. E. Ioannidis. Bitmap index design and evaluation. In Proceedings of the 1998 ACM SIGMOD: International Conference on Management of Data, pages 355-366, New York, NY, USA, 1998. ACM press.
-
(1998)
Proceedings of the 1998 ACM SIGMOD: International Conference on Management of Data
, pp. 355-366
-
-
Chan, C.-Y.1
Ioannidis, Y.E.2
-
6
-
-
38649087416
-
-
R3vis Corporation
-
R3vis Corporation. OpenRM Scene Graph, http://www.openrm.org, 1999-2006.
-
(1999)
OpenRM Scene Graph
-
-
-
7
-
-
0002766331
-
-
Kenneth C. Cox, Stephen G. Eick, and Taosong He. 3D Geographic Network Displays. SIGMOD Rec., 25(4):50-54, 1996.
-
Kenneth C. Cox, Stephen G. Eick, and Taosong He. 3D Geographic Network Displays. SIGMOD Rec., 25(4):50-54, 1996.
-
-
-
-
8
-
-
11144332457
-
Immersive Network Monitoring
-
April
-
Mike Fisk, Steven A. Smith, Paul Weber, Satyam Kothapally, and Thomas Caudell. Immersive Network Monitoring. In Proceedings of the 2003 Passive and Active Measurement Workshop, April 2003.
-
(2003)
Proceedings of the 2003 Passive and Active Measurement Workshop
-
-
Fisk, M.1
Smith, S.A.2
Weber, P.3
Kothapally, S.4
Caudell, T.5
-
10
-
-
77953296690
-
More NetFlow Tools: For Performance and Security
-
November
-
Carrie Gates, Michael Collins, Michael Duggan, Andrew Kompanek, and Mark Thomas. More NetFlow Tools: For Performance and Security. In Proceedings of the USENIX18th Systems Administration Conference (LISA 2004), pages 121-131, November 2004.
-
(2004)
Proceedings of the USENIX18th Systems Administration Conference (LISA 2004)
, pp. 121-131
-
-
Gates, C.1
Collins, M.2
Duggan, M.3
Kompanek, A.4
Thomas, M.5
-
11
-
-
33749532337
-
Preserving the Big Picture: Visual Network Traffic Analysis with TNV
-
October
-
John Goodall, Wayne Lutters, Penny Rheingans, and Anita Komlodi. Preserving the Big Picture: Visual Network Traffic Analysis with TNV. In Proceedings of the 2005 Workshop on Visualization for Computer Security, pages 47-54, October 2005.
-
(2005)
Proceedings of the 2005 Workshop on Visualization for Computer Security
, pp. 47-54
-
-
Goodall, J.1
Lutters, W.2
Rheingans, P.3
Komlodi, A.4
-
12
-
-
0038661039
-
The NERSC Visualization Greenbook: Future Visualization Needs of the DOE Computational Science Community Hosted at NERSC
-
Bernd Hamann, E. Wes Bethel, Horst Simon, and Juan Meza. The NERSC Visualization Greenbook: Future Visualization Needs of the DOE Computational Science Community Hosted at NERSC. The International Journal of High Performance Computing Applications, 17(2):97-124, 2002.
-
(2002)
The International Journal of High Performance Computing Applications
, vol.17
, Issue.2
, pp. 97-124
-
-
Hamann, B.1
Wes Bethel, E.2
Simon, H.3
Meza, J.4
-
13
-
-
84943259030
-
Visual specification of queries for finding patterns in time-series data
-
Harry Hochheiser and Ben Shneiderman. Visual specification of queries for finding patterns in time-series data. In Proceedings of Discovery Science, pages 441-446, 2001.
-
(2001)
Proceedings of Discovery Science
, pp. 441-446
-
-
Hochheiser, H.1
Shneiderman, B.2
-
15
-
-
0028514142
-
Visdb: Database exploration using multidimensional visualization
-
Daniel Keim and Hans-Peter Kriegel. Visdb: Database exploration using multidimensional visualization. IEEE Computer Graphics and Applications, 14(4):40-49, 1994.
-
(1994)
IEEE Computer Graphics and Applications
, vol.14
, Issue.4
, pp. 40-49
-
-
Keim, D.1
Kriegel, H.-P.2
-
17
-
-
33749533756
-
A user-centered look at glyph-based security visualization
-
October
-
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John Goodall, and Amit Joshi. A user-centered look at glyph-based security visualization. In Proceedings of the 2005 Workshop on Visualization for Computer Security, pages 21-28, October 2005.
-
(2005)
Proceedings of the 2005 Workshop on Visualization for Computer Security
, pp. 21-28
-
-
Komlodi, A.1
Rheingans, P.2
Ayachit, U.3
Goodall, J.4
Joshi, A.5
-
18
-
-
0033320460
-
Visualizing large-scale telecommunication networks and services (case study)
-
Los Alamitos, CA, USA, IEEE Computer Society Press
-
Eleftherios E. Koutsofios, Stephen C. North, Russell Truscott, and Daniel A. Keim. Visualizing large-scale telecommunication networks and services (case study). In VIS '99: Proceedings of the conference on Visualization '99, pages 457-461, Los Alamitos, CA, USA, 1999. IEEE Computer Society Press.
-
(1999)
VIS '99: Proceedings of the conference on Visualization '99
, pp. 457-461
-
-
Koutsofios, E.E.1
North, S.C.2
Truscott, R.3
Keim, D.A.4
-
20
-
-
33749527089
-
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations
-
October
-
Kiran Lakkaraju, Ratna Bearavolu, Adam Slagell, William Yurcik, and Stephen North. Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. In Proceedings of the 2005 Workshop on Visualization for Computer Security, October 2005.
-
(2005)
Proceedings of the 2005 Workshop on Visualization for Computer Security
-
-
Lakkaraju, K.1
Bearavolu, R.2
Slagell, A.3
Yurcik, W.4
North, S.5
-
22
-
-
4243116400
-
The Spinning Cube of Potential Doom
-
Stephen Lau. The Spinning Cube of Potential Doom. Communications of the ACM, 47(6):25-26, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 25-26
-
-
Lau, S.1
-
23
-
-
33645243543
-
A visual paradigm for network intrusion detection
-
June 17-19
-
Yarden Livnat, Jim Agutter, Shaun Moon, Robert Erbacher, and Stefano Foresti. A visual paradigm for network intrusion detection. In Proceedings of the 2005 IEEE Workshop on Information Assurance And Security, June 17-19 2005.
-
(2005)
Proceedings of the 2005 IEEE Workshop on Information Assurance And Security
-
-
Livnat, Y.1
Agutter, J.2
Moon, S.3
Erbacher, R.4
Foresti, S.5
-
24
-
-
20444495766
-
Portvis: A tool for port-based detection of security events
-
October
-
Jonhathan McPherson, Kwan-Liu Ma, Paul Krystosek, Tony Bartoletti, and Marvin Christensen. Portvis: A tool for port-based detection of security events. In Proceedings of CCS Workshop on Visualization and Data Mining for Computer Security, ACM Conference on Computer and Communication Security, October 2004.
-
(2004)
Proceedings of CCS Workshop on Visualization and Data Mining for Computer Security, ACM Conference on Computer and Communication Security
-
-
McPherson, J.1
Ma, K.-L.2
Krystosek, P.3
Bartoletti, T.4
Christensen, M.5
-
25
-
-
85094839698
-
Combining Cisco Netflow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics
-
John-Paul Navarro, Bill Nickless, and Linda Winkler. Combining Cisco Netflow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics. In Proceedings of the 14th Systems Administrator Conference (LISA 2000), pages 285-290, 2000.
-
(2000)
Proceedings of the 14th Systems Administrator Conference (LISA 2000)
, pp. 285-290
-
-
Navarro, J.-P.1
Nickless, B.2
Winkler, L.3
-
28
-
-
0001899816
-
Model 204 architecture and performance
-
Second International Workshop in High Performance Transaction Systems, Springer-Verlag
-
Patrick O'Neil. Model 204 architecture and performance. In Second International Workshop in High Performance Transaction Systems. Lecture Notes in Computer Science, vol. 359, Springer-Verlag 4059, 1987.
-
(1987)
Lecture Notes in Computer Science
, vol.359
, pp. 4059
-
-
O'Neil, P.1
-
31
-
-
39049090126
-
-
Peter Phaal, Sonia Panchen, and Neil McKee. Inmon corporation's sflow: A method for monitoring traffic in switched and routed networks. IETF RFC 3176, http://www.app.sietf.org/rfc/rfc3176.html, 2001.
-
Peter Phaal, Sonia Panchen, and Neil McKee. Inmon corporation's sflow: A method for monitoring traffic in switched and routed networks. IETF RFC 3176, http://www.app.sietf.org/rfc/rfc3176.html, 2001.
-
-
-
-
33
-
-
38049050883
-
-
Easy Software Products
-
Easy Software Products. The fast light toolkit, http://www.fltk.org, 2006.
-
(2006)
The fast light toolkit
-
-
-
34
-
-
39049096349
-
-
Lawrence Berkeley National Laboratory Scientific Data Management Group
-
Lawrence Berkeley National Laboratory Scientific Data Management Group. Fastbit. http://sdm.lbl.gov/fastbit, 2006.
-
(2006)
Fastbit
-
-
-
35
-
-
53949094341
-
Multidimensional indexing and query coordination for tertiary storage management
-
IEEE Computer Society, July
-
Arie Shoshani, Luis Bernardo, Henrik Nordberg, Doron Rotem, and Alex Sim. Multidimensional indexing and query coordination for tertiary storage management. In Proceedings of the 11th International Conference on Scientific and Statistical Database Management. IEEE Computer Society 214225, July 1999.
-
(1999)
Proceedings of the 11th International Conference on Scientific and Statistical Database Management
, pp. 214225
-
-
Shoshani, A.1
Bernardo, L.2
Nordberg, H.3
Rotem, D.4
Sim, A.5
-
37
-
-
33749451632
-
Query-Driven Visualization of Large Data Sets
-
October
-
Kurt Stockinger, John Shalf, Kesheng Wu, and E. Wes Bethel. Query-Driven Visualization of Large Data Sets. In Proceedings of IEEE Visualization, pages 167-174, October 2005.
-
(2005)
Proceedings of IEEE Visualization
, pp. 167-174
-
-
Stockinger, K.1
Shalf, J.2
Wu, K.3
Wes Bethel, E.4
-
38
-
-
33644950279
-
Bitmap indices for fast end-user physics analysis in root
-
Elsevier
-
Kurt Stockinger, Kesheng Wu, Rene Brun, and P. Canal. Bitmap indices for fast end-user physics analysis in root. In Nuclear Instruments and Methods in Physics Research, Section A - Accelerators, Spectrometers, Detectors and Associated Equipment, volume 599, pages 99-102. Elsevier, 2006.
-
(2006)
Nuclear Instruments and Methods in Physics Research, Section A - Accelerators, Spectrometers, Detectors and Associated Equipment
, vol.599
, pp. 99-102
-
-
Stockinger, K.1
Wu, K.2
Brun, R.3
Canal, P.4
-
40
-
-
34948892521
-
Illuminating the Path -The Research and Development Agenda for Visual Analytics
-
James J. Thomas and Kristin A. Cook eds
-
James J. Thomas and Kristin A. Cook eds. Illuminating the Path -The Research and Development Agenda for Visual Analytics. IEEE Computer Society Press, 2005.
-
(2005)
IEEE Computer Society Press
-
-
-
43
-
-
39049093818
-
-
Kesheng Wu, Ekow Otoo, and Arie Shoshani. On the performance of bitmap indices for high cardinality attributes. In In Proceedings of the International Conference of Very Large Data Bases, pages 24-35, 2004.
-
Kesheng Wu, Ekow Otoo, and Arie Shoshani. On the performance of bitmap indices for high cardinality attributes. In In Proceedings of the International Conference of Very Large Data Bases, pages 24-35, 2004.
-
-
-
-
44
-
-
13944256121
-
VisFlowConnect: NetFlow Visualizations of Link Relations for Security Situational Awareness
-
October
-
Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, and Kiran Lakkaraju. VisFlowConnect: NetFlow Visualizations of Link Relations for Security Situational Awareness. In Internet Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC-2004), October 2004.
-
(2004)
Internet Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC-2004)
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
|