Search For:

Displaying 1-16 out of 16 total
Preserving the Big Picture: Visual Network Traffic Analysis with TN
Found in: Visualization for Computer Security, IEEE Workshops on
By John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi
Issue Date:October 2005
pp. 6
When performing packet-level analysis in intrusion detection, analysts often lose sight of the
 
Cross-Cultural Usability for Digital Libraries
Found in: Digital Libraries, Joint Conference on
By Nadia Caidi, Anita Komlodi
Issue Date:May 2003
pp. 415
The scope and reach of digital libraries (DL) is truly global, spanning geographical and cultural boundaries, yet few scholars have investigated the influence of culture as it pertains to the design and use of digital libraries. This workshop will examine ...
   
Focusing on Context in Network Traffic Analysis
Found in: IEEE Computer Graphics and Applications
By John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi
Issue Date:March 2006
pp. 72-80
Intrusion detection analysis requires understanding the context of an event, usually discovered by examining packet-level detail. When analysts attempt to construct the big picture of a security event, they must move between high-level representations and ...
 
A User-centered Look at Glyph-based Security Visualization
Found in: Visualization for Computer Security, IEEE Workshops on
By Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi
Issue Date:October 2005
pp. 3
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design process, in which we identi- fied design guidelines to support ID users. ID analys...
 
Evaluation Challenges for a Federation of Heterogeneous Information Providers: The Case of NASA's Earth Science Information Partnerships
Found in: Enabling Technologies, IEEE International Workshops on
By Catherine Plaisant, Anita Komlodi, Francis Lindsay
Issue Date:March 2000
pp. 130
NASA's Earth Science Information Partnership Federation is an experiment funded to assess the ability of a group of widely heterogeneous earth science data or service providers to self organize and provide improved and affordable access to an expanding ear...
 
Using an intelligent interviewer to perform cognitive assessments
Found in: CHI '13 Extended Abstracts on Human Factors in Computing Systems (CHI EA '13)
By Anita Komlodi, Brian Duffy, Kathleen Weaver
Issue Date:April 2013
pp. 259-264
Intelligent Virtual Agents (IVAs) are computer systems that have specifically designed capabilities ranging from simple conversation agents to complex systems that can accomplish activities on our behalf. As a result, state of the art Computerized Conversa...
     
Children's formal and informal definition of technology
Found in: Proceedings of the 2012 iConference (iConference '12)
By Anita Komlodi, Jieyu Wang
Issue Date:February 2012
pp. 587-588
Though today's children have many chances to interact with technology, what they understand about technology from their point of view still needs to be explored. In this poster we report how children define technology and what they understand technology to...
     
"Girls don't waste time": pre-adolescent attitudes toward ICT
Found in: CHI '06 extended abstracts on Human factors in computing systems (CHI '06)
By A. Ant Ozok, Anita Komlodi, Claudia Morrell, Lee Boot, Manpreet Kaur, Shelia R. Cotten, Wayne G. Lutters, Weimin Hou, Zeynep Tufekci
Issue Date:April 2006
pp. 875-880
Relying on naturalistic observation, via video self-documentaries, contextual interviews, and focus groups, we explored gender differences in the information and communication technology (ICT) perception and use of United States middle school students. Our...
     
A user-centered approach to visualizing network traffic for intrusion detection
Found in: CHI '05 extended abstracts on Human factors in computing systems (CHI '05)
By A. Ant Ozok, Anita Komlodi, John R. Goodall, Penny Rheingans, Wayne G. Lutters
Issue Date:April 2005
pp. 1403-1406
Intrusion detection (ID) analysts are charged with ensuring the safety and integrity of today's high-speed computer networks. Their work includes the complex task of searching for indications of attacks and misuse in vast amounts of network data. Although ...
     
I know my network: collaboration and expertise in intrusion detection
Found in: Proceedings of the 2004 ACM conference on Computer supported cooperative work (CSCW '04)
By Anita Komlodi, John R. Goodall, Wayne G. Lutters
Issue Date:November 2004
pp. 342-345
The work of intrusion detection (ID) in accomplishing network security is complex, requiring highly sought-after expertise. While limited automation exists, the role of human ID analysts remains crucial. This paper presents the results of an exploratory fi...
     
Search history for user support in information-seeking interfaces
Found in: CHI '00 extended abstracts on Human factors in computer systems (CHI '00)
By Anita Komlodi
Issue Date:April 2000
pp. 75-76
The research overview described focuses on the design of search history displays to support information seeking (IS). It examines users' IS activities, current and potential use of histories, and building on this theoretical framework, assesses prototype i...
     
Key frame preview techniques for video browsing
Found in: Proceedings of the third ACM conference on Digital libraries (DL '98)
By Anita Komlodi, Gary Marchionini
Issue Date:June 1998
pp. 118-125
This presentation focuses on the strategic design planning and vision creation process for the E-Quarium, the online complement to the Monterey Bay Aquarium. More than six months of informed investigation and analysis resulted in an ambitious redesign of t...
     
Visual video browsing interfaces using key frames
Found in: CHI 98 conference summary on Human factors in computing systems (CHI '98)
By Anita Komlodi, Laura Slaughter
Issue Date:April 1998
pp. 337-338
We present an approach to control information flow in object-oriented systems. The decision of whether an informatin flow is permitted or denied depends on both the authorizations specified on the objects and the process by which information is obtained an...
     
Bringing treasures to the surface: previews and overviews in a prototype for the Library of Congress National Digital Library
Found in: CHI 98 conference summary on Human factors in computing systems (CHI '98)
By Anita Komlodi, Catherine Plaisant, Gary Marchionini
Issue Date:April 1998
pp. 187-188
We present an approach to control information flow in object-oriented systems. The decision of whether an informatin flow is permitted or denied depends on both the authorizations specified on the objects and the process by which information is obtained an...
     
Bringing treasures to the surface: iterative design for the Library of Congress National Digital Library Program
Found in: Proceedings of the SIGCHI conference on Human factors in computing systems (CHI '97)
By Anita Komlodi, Catherine Plaisant, Gary Marchionini, Laura Campbell, Tom Bruns
Issue Date:March 1997
pp. 518-525
We present an approach to control information flow in object-oriented systems. The decision of whether an informatin flow is permitted or denied depends on both the authorizations specified on the objects and the process by which information is obtained an...
     
The role of intermediary services in emerging digital libraries
Found in: Proceedings of the first ACM international conference on Digital libraries (DL '96)
By Allen Brewer, Anita Komlodi, Karla Hahn, Wei Ding
Issue Date:March 1996
pp. 29-35
This presentation focuses on the strategic design planning and vision creation process for the E-Quarium, the online complement to the Monterey Bay Aquarium. More than six months of informed investigation and analysis resulted in an ambitious redesign of t...
     
 1