MPI-INF Logo
Campus Event Calendar

Event Entry

What and Who

Title 1: Multi-Scale Rectangular Map Approximations of the WorldTitle 2; Interactive Exploration of the network behavior of personal machines

1. Frederik Siekmann - 2. Sascha Simon
Max-Planck-Institut für Informatik - D4
Bachelor Seminar
AG 1, AG 3, AG 4, AG 5, SWS, RG1, MMCI  
MPI Audience
English

Date, Time and Location

Monday, 18 May 2009
14:00
60 Minutes
E1 4
022
Saarbrücken

Contact

Mike Sips
651
--email hidden
passcode not visible
logged in users only

* Speaker 1: Frederik Siekmann (MPI-I)
*
Multi-Scale Rectangular Map Approximations of the World
* Abstract:
Cartograms are a well-studied method to visualize the distribution of
geo-spatial data but they are generally restricted to a single static view
of the world. We propose multi-scale rectangular map approximations
showing social and economic data of the world at
different levels of geographical abstractions. These rectangular map
approximations allow the user to explore patterns across different
geographical abstraction levels interactively.

In my talk, I will give a very short overview of the current state of
cartogram techniques and show how multi-scale rectangular map
approximations fit into this context. We will present the construction
algorithm for these map approximations and give some background
information on it. By analyzing and evaluating some examples I will show
that rectangular map approximations perform well in practice.


* Speaker 2: Sascha Simon (MPI-I)
* Title: Interactive Exploration of the network behavior of personal machines
* Abstract:
With the increasing availability of personalized web-services running on
local machines    botnets, trojans, and other kind of malicious code
become serious security threads. These new tools just requires basic
programming and scripting skills by the hacker to exploit vulnerabilities
of personal services such as IRC, P2P application to infect other machines
and launch attacks while an administrator has to invest huge efforts to
detect infected machines.

In my talk I will discuss steps toward a integrated framework to support
the administrator to detect the point when a local machine shows
suspicious behavior. In my research I investigate the idea that knowing
the local behavior makes it hard for the attacker to act undetected. I
will briefly discuss the current situation, our design decisions and the
interactive visual interface.

Ellen Fries, 05/13/2009 11:00 -- Created document.