Learn More
Due to the advances in positioning technologies, the real time information of moving objects becomes increasingly available, which has posed new challenges to the database research. As a long-standing technique to identify overall distribution patterns in data, clustering has achieved brilliant successes in analyzing static datasets. In this paper, we study(More)
We present a visualization design to enhance the ability of an administrator to detect and investigate anomalous traffic between a local network and external domains. Central to the design is a parallel axes view which displays NetFlow records as links between two machines or domains while employing a variety of visual cues to assist the user. We describe(More)
BACKGROUND Riboflavin (vitamin B2), the precursor of the flavin cofactors flavin mononucleotide (FMN) and flavin adenine dinucleotide (FAD), is used commercially as an animal feed supplement and food colorant. E. coli is a robust host for various genetic manipulations and has been employed for efficient production of biofuels, polymers, amino acids, and(More)
—Cooperative communication has attracted dramatic attention in the last few years due to its advantage in mitigating channel fading. Despite much effort that has been made in theoretical analysis of the performance gain, cooperative relay selection, which is one of the fundamental issues in cooperative communications, is still left as an open problem. In(More)
In the UNIX/Linux environment the kernel can log every command process created by every user using process accounting. This data has many potential uses, including the investigation of security incidents. However, process accounting data is also sensitive since it contains private user information. Consequently, security system administrators have been(More)
We present the design and implementation of VisFlow-Connect, a powerful new tool for visualizing network traffic flow dynamics for situational awareness. The visualization capability provided by VisFlowConnect allows an operator to assess the state of a large and complex network given an overall view of the entire network and filter/drill-down features with(More)
In a significant minority of cases, certain pronouns, especially the pronoun it, can be used without referring to any specific entity. This phenomenon of pleonastic pronoun usage poses serious problems for systems aiming at even a shallow understanding of natural language texts. In this paper, a novel approach is proposed to identify such uses of it: the(More)