Sciweavers

1737 search results - page 346 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
TPDS
2010
194views more  TPDS 2010»
13 years 3 months ago
On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
—This paper analyzes the potential of cooperative proxy caching for peer-to-peer (P2P) traffic as a means to ease the burden imposed by P2P traffic on Internet Service Providers ...
Mohamed Hefeeda, Behrooz Noorizadeh
RBAC
2000
129views more  RBAC 2000»
13 years 6 months ago
Enabling technologies for role based online decision engines
: Enabling Technologies for Role Based Online Decision Engines Thomas Hildmann, Thomas Gebhardt 22-Feb-2000 The goal of our work at the Technical University of Berlin is to develop...
Thomas Gebhardt, Thomas Hildmann
JUCS
2010
109views more  JUCS 2010»
12 years 11 months ago
Semantics of Query-Driven Communication of Exact Values
: We address the question of how to communicate among distributed processes values such as real numbers, continuous functions and geometrical solids with arbitrary precision, yet e...
Michal Konecný, Amin Farjudian
3DGIS
2006
Springer
13 years 10 months ago
3D Navigation for 3D-GIS - Initial Requirements
The needs for three-dimensional (3D) visualization and navigation within 3D-GIS environment are growing and expanding rapidly in a variety of fields. In a steady shift from tradit...
Ivin Amri Musliman, Alias Abdul-Rahman, Volker Coo...
IJCNN
2008
IEEE
13 years 11 months ago
Learning to select relevant perspective in a dynamic environment
— When an agent observes its environment, there are two important characteristics of the perceived information. One is the relevance of information and the other is redundancy. T...
Zhihui Luo, David A. Bell, Barry McCollum, Qingxia...