xlsx
This dataset contains the results of a systematic literature review of information visualization in Building Information Modeling (BIM). BIM employs 3D CAD models as a central knowledge base for large-scale facility design, construction, and operation. For many years now, the construction industry has researched how to best take advantage of this integrated environment. Its growing information complexity calls upon innovative techniques for effective visual analysis and exploration.
- Categories:
Efficient intrusion detection and analysis of the security landscape in big data environments present challenge for today's users. Intrusion behavior can be described by provenance graphs that record the dependency relationships between intrusion processes and the infected files. Existing intrusion detection methods typically analyze and identify the anomaly either in a single provenance path or the whole provenance graph, neither of which can achieve the benefit on both detection accuracy and detection time.
- Categories:
For reproducibility purposes, a large test bench of fiber links is simulated to test the Baseband Subcarrier Sweep framework and associated monitoring techniques. The test bench comprises three sets of 1000 fiber links each containing one, two, or three faults.
- Categories:
Static analysis is increasingly used by companies and individual code developers to detect bugs and security vulnerabilities. As programs grow more complex, the analyses have to support new code concepts, frameworks and libraries. However, static-analysis code itself is also prone to bugs. While more complex analyses are written and used in production systems every day, the cost of debugging and fixing them also increases tremendously.
- Categories:
The two dataset files contains the experimental results for ICDB DMode and ICDB AMode.
- Categories:
The file contains raw data collected from 9 pedestrians. Three of them walked in Track 1, another three walked in Track 2 and the last three walked in Track 3. All the pedestrians ended their walks at the starting point. Track 1 and Track 3 cover a distance of 150.3m. While, the Track covers a distance of 111.4m.
- Categories:
In this paper, we present the Tree Exploration Discovery Protocol (TEDP), proving that shortest paths can be built at the same time that the topology information is gathered, without extra messages compared to LLDP.
- Categories:
- Categories:
Pages
- « first
- ‹ previous
- 1
- 2
- 3
- 4