The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Computer Graphics and Applications
2006, volume: 26, number: 2

  1. Gary Singh
    Things Between and Behind. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:4-5 [Journal]
  2. Laurel M. Sheppard
    Visual Effects and Video Analysis Lead to Olympics Victories. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:6-11 [Journal]
  3. Bernd Fröhlich, Jan Hochstrate, Alexander Kulik, Anke Huckauf
    On 3D Input Devices. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:15-19 [Journal]
  4. Tamara Munzner, Chris Johnson, Robert Moorhead, Hanspeter Pfister, Penny Rheingans, Terry S. Yoo
    NIH-NSF Visualization Research Challenges Report Summary. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:20-24 [Journal]
  5. Kwan-Liu Ma
    Guest Editor's Introduction: Visualization for Cybersecurity. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:26-27 [Journal]
  6. Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson
    IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:28-39 [Journal]
  7. Takayuki Itoh, Hiroki Takakura, Atsushi Sawada, Koji Koyamada
    Hierarchical Visualization of Network Intrusion Detection Data. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:40-47 [Journal]
  8. Stefano Foresti, James Agutter, Yarden Livnat, Shaun Moon, Robert F. Erbacher
    Visual Correlation of Network Alerts. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:48-59 [Journal]
  9. Gregory J. Conti, Kulsoom Abdullah, Julian B. Grizzard, John T. Stasko, John A. Copeland, Mustaque Ahamad, Henry L. Owen, Christopher P. Lee
    Countering Security Information Overload through Alert and Packet Visualization. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:60-70 [Journal]
  10. John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi
    Focusing on Context in Network Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:72-80 [Journal]
  11. James F. Blinn
    How to Solve a Quadratic Equation, Part 2. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:82-87 [Journal]
  12. Aristides A. G. Requicha, Dan Arbuckle
    CAD/CAM for Nanoscale Self-Assembly. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:88-91 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002