Sciweavers

10682 search results - page 2020 / 2137
» A Graph Based Process Representation for Process Modeling
Sort
View
JALC
2006
87views more  JALC 2006»
15 years 4 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
JSW
2008
98views more  JSW 2008»
15 years 4 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
JGTOOLS
2006
111views more  JGTOOLS 2006»
15 years 4 months ago
Stochastic Billboard Clouds for Interactive Foliage Rendering
We render tree foliage levels of detail (LODs) using a new adaptation of billboard clouds. Our contributions are a simple and efficient billboard cloud creation algorithm designed...
J. Dylan Lacewell, David Edwards, Peter Shirley, W...
ECRA
2007
116views more  ECRA 2007»
15 years 4 months ago
Two-level workload characterization of online auctions
Online auctions are rapidly becoming one of the significant forms of electronic commerce for buying and selling goods and services. A good understanding of the workload of auctio...
Vasudeva Akula, Daniel A. Menascé
JSA
2006
113views more  JSA 2006»
15 years 4 months ago
A power-efficient TCAM architecture for network forwarding tables
Stringent memory access and search speed requirements are two of the main bottlenecks in wire speed processing. Most viable search engines are implemented in content addressable m...
Taskin Koçak, Faysal Basci
« Prev « First page 2020 / 2137 Last » Next »