Learn More
—Ad hoc networks, due to their improvised nature, are frequently established in insecure environments and hence become susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. A number of(More)
We present a user interface, based on parallel coordinates, that facilitates exploration of volume data. By explicitly representing the visualization parameter space, the interface provides an overview of rendering options and enables users to easily explore different parameters. Rendered images are stored in an integrated history bar that facilitates(More)
One important problem in target advertising and viral marketing on online social networking sites is the efficient identification of communities with common interests in large social networks. Existing methods involve large scale community detection on the entire social network before determining the interests of individuals within these communities. This(More)