Arl-vids Visualization Techniques: 3d Information Visualization of Network Security Events a Thesis Submitted to the Graduate School in Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science by Tyler J. Gaw

نویسنده

  • WAYNE ZAGE
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AN XML-BASED DIAGRAMMATIC DYNAMIC MODELING AND SIMULATION SYSTEM By HYUNJU SHIM A THESIS PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE

of Thesis Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Master of Science AN XML-BASED DIAGRAMMATIC DYNAMIC MODELING AND SIMULATION SYSTEM By Hyunju Shim August, 2003 Chair: Paul A. Fishwick Major Department: Computer and Information Science and Engineering The emergence of eXtensible Markup Language (XML) brought a ne...

متن کامل

A Turán Theorem for Random Graphs Dean of the Graduate School Date a Turán Theorem for Random Graphs a Turán Theorem for Random Graphs

of a thesis submitted to the Faculty of the Graduate School of Emory University in partial fulfillment of the requirements of the degree of Master of Science Department of Mathematics and Computer Science

متن کامل

A Hybrid Method for Segmentation and Visualization of Teeth in Multi-Slice CT scan Images

Introduction: Various computer assisted medical procedures such as dental implant, orthodontic planning, face, jaw and cosmetic surgeries require automatic quantification and volumetric visualization of teeth. In this regard, segmentation is a major step. Material and Methods: In this paper, inspired by our previous experiences and considering the anatomical knowledge of teeth and jaws, we prop...

متن کامل

The Idea Of Using The Steganography As Encryption Tool

the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014